This document describes common misconfigurations of F5 Networks BigIP systems.
☆234Aug 1, 2019Updated 6 years ago
Alternatives and similar repositories for bigipsecurity
Users that are interested in bigipsecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- Graphite collectors☆17Apr 10, 2016Updated 9 years ago
- ASM Application Ready Templates☆23Apr 12, 2022Updated 3 years ago
- iRules, scripts, iApps, ...☆33Oct 26, 2017Updated 8 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- TMOS parser and application extractor☆14Jan 3, 2026Updated 2 months ago
- Research on GraphQL from an AppSec point of view.☆418May 24, 2023Updated 2 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- CVE-2018-13379☆254Aug 14, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆139Jun 27, 2021Updated 4 years ago
- HTTP.ninja☆147Sep 3, 2023Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Solutions, tools and examples developed by the F5 Professional Services team.☆53Oct 27, 2025Updated 4 months ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- ☆50Mar 12, 2024Updated 2 years ago
- This is a list of what I consider F5 LTM iRule development best practices.☆21Jun 5, 2015Updated 10 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆738May 4, 2019Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- BIGREST - Python SDK for F5 iControl REST API☆27Mar 4, 2024Updated 2 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- This repository features a collection iRules of popular and/or critical mitigation updates, maintained by F5ers.☆44Mar 20, 2025Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- iRules for F5 TMOS☆12Mar 6, 2026Updated 2 weeks ago
- Jsdir is a Burp Suite extension that extracts hidden paths from js files and beautifies it for further reading.☆122Sep 12, 2020Updated 5 years ago
- SQL Server Reporting Services(CVE-2020-0618)中的RCE☆198Feb 15, 2020Updated 6 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- ☆28Sep 25, 2020Updated 5 years ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago