HTTPLeaks - All possible ways, a website can leak HTTP requests
☆2,103Jan 3, 2026Updated 4 months ago
Alternatives and similar repositories for HTTPLeaks
Users that are interested in HTTPLeaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors☆2,938Feb 23, 2022Updated 4 years ago
- Welcome to the XSS Challenge Wiki!☆1,594Jun 24, 2020Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,494Oct 12, 2024Updated last year
- A collection of browser-based side channel attack vectors.☆757Mar 19, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,178May 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,155Apr 21, 2024Updated 2 years ago
- Probe a rendering engine for vulnerabilities and other features☆368Oct 13, 2021Updated 4 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,495Jan 9, 2025Updated last year
- Prototype Pollution and useful Script Gadgets☆1,620Jan 27, 2024Updated 2 years ago
- A Tool for Domain Flyovers☆5,931May 22, 2022Updated 3 years ago
- Browser's XSS Filter Bypass Cheat Sheet☆1,151May 6, 2017Updated 9 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,668Feb 8, 2025Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,293Aug 18, 2025Updated 9 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,233Aug 14, 2024Updated last year
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- ☆698Jul 4, 2022Updated 3 years ago
- Cure53 Browser Security White Paper☆297Nov 29, 2017Updated 8 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,548Dec 7, 2022Updated 3 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,171Dec 16, 2024Updated last year
- A python script that finds endpoints in JavaScript files☆4,350Apr 13, 2024Updated 2 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,310Jan 26, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆2,326Dec 8, 2023Updated 2 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,744Dec 1, 2024Updated last year
- A collection of JavaScript engine CVEs with PoCs☆2,318Sep 3, 2019Updated 6 years ago
- Reverse proxies cheatsheet☆1,878Nov 4, 2023Updated 2 years ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,660May 25, 2024Updated last year
- DNS Takeover tool written in Go☆2,065Mar 16, 2026Updated 2 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,902Nov 10, 2023Updated 2 years ago
- 🔪Browser logic vulnerabilities☆702Jan 23, 2021Updated 5 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,588Apr 15, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,473Sep 14, 2023Updated 2 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Collection of CTF Web challenges I made☆2,841Aug 31, 2025Updated 8 months ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆385May 16, 2019Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,720Jan 5, 2026Updated 4 months ago
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆758May 6, 2024Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,936Sep 27, 2021Updated 4 years ago