detectify / Varnish-H2-Request-Smuggling
☆56Updated 3 years ago
Alternatives and similar repositories for Varnish-H2-Request-Smuggling:
Users that are interested in Varnish-H2-Request-Smuggling are comparing it to the libraries listed below
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- ☆94Updated 3 years ago
- Same Origin XSS challenge☆56Updated 3 years ago
- ☆37Updated 4 years ago
- ☆164Updated 3 years ago
- ☆46Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- Burp Bounty profiles☆82Updated 3 years ago
- ☆50Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- ☆19Updated 2 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- Authenticated SSRF in Grafana☆81Updated 10 months ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 5 years ago
- ☆71Updated 3 years ago
- Script to test open Akamai ARL vulnerability.☆71Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- ☆70Updated 3 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆53Updated 3 years ago
- ☆44Updated 4 years ago
- ☆19Updated 5 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆27Updated 7 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated 11 months ago
- ☆48Updated 4 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago