cldrn / InsecureProgrammingDBLinks
Insecure programming functions database
☆104Updated 2 years ago
Alternatives and similar repositories for InsecureProgrammingDB
Users that are interested in InsecureProgrammingDB are comparing it to the libraries listed below
Sorting:
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆107Updated 5 years ago
- JWT Support for Burp☆117Updated 6 months ago
- Data extraction tool for Docker Registry API☆135Updated last year
- Exploit for WebSocket Vulnerability in Apache Tomcat☆169Updated 5 years ago
- ☆119Updated 5 years ago
- Apache Solr RCE via Velocity template☆114Updated 6 years ago
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆165Updated 2 years ago
- Public Disclosures☆91Updated 3 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆142Updated 4 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆184Updated 5 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 6 years ago
- ☆127Updated 4 years ago
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600☆137Updated 7 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆108Updated 5 years ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago
- MOGWAI LABS JMX exploitation toolkit☆206Updated 2 years ago
- Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12☆96Updated 3 years ago
- JWT Support for Burp☆258Updated 6 months ago
- Jackson Rce For CVE-2019-12384☆102Updated 6 years ago
- Gopher Tomcat Deployer☆48Updated 7 years ago
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆77Updated 7 years ago
- SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities, with CRLF chaining capabilities☆185Updated 4 years ago
- Authenticated SSRF in Grafana☆83Updated last year
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆95Updated 2 months ago
- Burp extension intended to compact Burp extension tabs by hijacking them to own tab.☆131Updated 4 years ago
- ☆65Updated 5 years ago
- jolokia-exploitation-toolkit☆308Updated last year
- A vulnerable application exposing Spring Boot Actuators☆123Updated 6 years ago