detectify / Varnish-H2-Request-SmugglingLinks
☆56Updated 4 years ago
Alternatives and similar repositories for Varnish-H2-Request-Smuggling
Users that are interested in Varnish-H2-Request-Smuggling are comparing it to the libraries listed below
Sorting:
- ☆170Updated 4 years ago
- Client-Side Prototype Pollution Tools☆86Updated 4 years ago
- ☆29Updated 3 years ago
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- ☆95Updated 4 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- ☆88Updated last year
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- ☆65Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- ☆148Updated 3 years ago
- Prototype Pollution exploits collection☆37Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆38Updated 8 months ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- ☆76Updated 5 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 6 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- ☆73Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- Burp Bounty profiles☆81Updated 4 years ago