detectify / Varnish-H2-Request-Smuggling
☆56Updated 3 years ago
Alternatives and similar repositories for Varnish-H2-Request-Smuggling:
Users that are interested in Varnish-H2-Request-Smuggling are comparing it to the libraries listed below
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- ☆94Updated 3 years ago
- ☆159Updated 3 years ago
- ☆36Updated 4 years ago
- Gopher Tomcat Deployer☆47Updated 6 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆48Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- ☆70Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021 ‐44228)?☆45Updated 2 years ago
- Burp Bounty profiles☆82Updated 3 years ago
- Authenticated SSRF in Grafana☆79Updated 7 months ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆53Updated 3 years ago
- ☆44Updated 4 years ago
- Same Origin XSS challenge☆56Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆27Updated 6 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆62Updated 3 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆107Updated 3 years ago
- Utility for creating ZipSlip archives☆69Updated 2 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 2 years ago
- A collection of scripts for bug-bounty related stuff☆38Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆25Updated 4 months ago
- sub domain wild card filtering tool☆41Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated 8 months ago
- Broken Link Hijacking Burp Extension☆56Updated 5 years ago
- ☆19Updated 4 years ago