detectify / Varnish-H2-Request-SmugglingLinks
☆56Updated 3 years ago
Alternatives and similar repositories for Varnish-H2-Request-Smuggling
Users that are interested in Varnish-H2-Request-Smuggling are comparing it to the libraries listed below
Sorting:
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆26Updated 4 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- ☆72Updated 3 years ago
- ☆26Updated 2 years ago
- ☆94Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- ☆37Updated 4 years ago
- websocket-connection-smuggler☆68Updated 5 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆26Updated 8 months ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- ☆166Updated 3 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- Same Origin XSS challenge☆61Updated 3 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆54Updated 3 years ago
- ☆50Updated 4 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆48Updated 4 years ago
- ☆59Updated 11 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Authenticated SSRF in Grafana☆82Updated 11 months ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆91Updated 5 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 2 weeks ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- ☆15Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- ☆44Updated 4 years ago