HTTPLeaks - All possible ways, a website can leak HTTP requests
☆2,104Jan 3, 2026Updated 3 months ago
Alternatives and similar repositories for HTTPLeaks
Users that are interested in HTTPLeaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors☆2,948Feb 23, 2022Updated 4 years ago
- Welcome to the XSS Challenge Wiki!☆1,594Jun 24, 2020Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,148Apr 21, 2024Updated 2 years ago
- Probe a rendering engine for vulnerabilities and other features☆368Oct 13, 2021Updated 4 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,488Jan 9, 2025Updated last year
- Prototype Pollution and useful Script Gadgets☆1,612Jan 27, 2024Updated 2 years ago
- A Tool for Domain Flyovers☆5,927May 22, 2022Updated 3 years ago
- Browser's XSS Filter Bypass Cheat Sheet☆1,151May 6, 2017Updated 8 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,639Feb 8, 2025Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,289Aug 18, 2025Updated 8 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,182Aug 14, 2024Updated last year
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- ☆697Jul 4, 2022Updated 3 years ago
- Cure53 Browser Security White Paper☆299Nov 29, 2017Updated 8 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,546Dec 7, 2022Updated 3 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,154Dec 16, 2024Updated last year
- A python script that finds endpoints in JavaScript files☆4,334Apr 13, 2024Updated 2 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,306Jan 26, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆2,323Dec 8, 2023Updated 2 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,739Dec 1, 2024Updated last year
- A collection of JavaScript engine CVEs with PoCs☆2,317Sep 3, 2019Updated 6 years ago
- Reverse proxies cheatsheet☆1,862Nov 4, 2023Updated 2 years ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,655May 25, 2024Updated last year
- DNS Takeover tool written in Go☆2,051Mar 16, 2026Updated last month
- 🔪Browser logic vulnerabilities☆701Jan 23, 2021Updated 5 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,886Nov 10, 2023Updated 2 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,577Apr 15, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,436Sep 14, 2023Updated 2 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Collection of CTF Web challenges I made☆2,836Aug 31, 2025Updated 8 months ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆384May 16, 2019Updated 6 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,700Jan 5, 2026Updated 3 months ago
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆757May 6, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,927Sep 27, 2021Updated 4 years ago