SSRF (Server Side Request Forgery) testing resources
☆2,486Oct 12, 2024Updated last year
Alternatives and similar repositories for SSRF-Testing
Users that are interested in SSRF-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,519Sep 4, 2025Updated 7 months ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,341Apr 18, 2023Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,322Apr 13, 2024Updated last year
- Open Redirect Payloads☆657Oct 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year
- Browser's XSS Filter Bypass Cheat Sheet☆1,153May 6, 2017Updated 8 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,363Jan 24, 2021Updated 5 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,139Dec 16, 2024Updated last year
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- A Tool for Domain Flyovers☆5,921May 22, 2022Updated 3 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,792Apr 26, 2024Updated last year
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,164Jul 31, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,912Sep 27, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,414Sep 14, 2023Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,479Jan 9, 2025Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,518Jan 21, 2020Updated 6 years ago
- ☆2,321Dec 8, 2023Updated 2 years ago
- Awesome XSS stuff☆5,094Oct 30, 2024Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆481Jan 1, 2018Updated 8 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,144Aug 14, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A curated list of amazingly awesome Burp Extensions☆3,389Feb 17, 2026Updated last month
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆963Dec 31, 2021Updated 4 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,618Feb 8, 2025Updated last year
- Payloads for CRLF Injection☆227Oct 12, 2024Updated last year
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆519Jul 29, 2020Updated 5 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,259Jan 8, 2026Updated 3 months ago
- Collection of CTF Web challenges I made☆2,829Aug 31, 2025Updated 7 months ago
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Web application fuzzer☆6,464Jan 21, 2026Updated 2 months ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,691Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,869Nov 10, 2023Updated 2 years ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,417Mar 26, 2026Updated 2 weeks ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,029Feb 5, 2021Updated 5 years ago
- DNS Takeover tool written in Go☆2,044Mar 16, 2026Updated 3 weeks ago
- A collection of custom security tools for quick needs.☆3,287May 1, 2023Updated 2 years ago