☆25Mar 11, 2025Updated 11 months ago
Alternatives and similar repositories for wwe
Users that are interested in wwe are comparing it to the libraries listed below
Sorting:
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- 在xxe中使用smb外带多行内容☆101Nov 9, 2025Updated 3 months ago
- Bypass Cloudflare human verification 绕过Cloudflare真人检测☆20Jul 12, 2024Updated last year
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated last year
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- ☆23Apr 21, 2022Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- National Graduation Exam Score from 2022 to 2024☆11Jul 17, 2024Updated last year
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- ☆29Jan 10, 2023Updated 3 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Monitoring the Cloud Landscape☆92Feb 19, 2026Updated last week
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Apr 22, 2020Updated 5 years ago
- GreHack 2021 CodeQL for Java workshop☆73Nov 19, 2021Updated 4 years ago
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆34Sep 19, 2022Updated 3 years ago
- Predict Mongo ObjectIds☆150May 2, 2018Updated 7 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- Estimating programming tasks using neural networks☆10Jun 29, 2018Updated 7 years ago
- Tools for diffing and comparing web content. Also includes a web server that makes diffs available as an HTTP service.☆18Feb 20, 2026Updated last week
- ☆42Updated this week
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Godzilla v1.0 source code☆38Aug 26, 2020Updated 5 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆111Jun 23, 2025Updated 8 months ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆227Jul 24, 2025Updated 7 months ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆96Oct 7, 2025Updated 4 months ago
- forked from frohoff/ysoserial and added my own payloads.☆154Mar 6, 2020Updated 5 years ago