An Evil OIDC Server
☆53Oct 19, 2022Updated 3 years ago
Alternatives and similar repositories for oidc-ssrf
Users that are interested in oidc-ssrf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆95Sep 18, 2021Updated 4 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- ☆12Jan 30, 2025Updated last year
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 11 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- ☆16May 15, 2024Updated last year
- some sploits☆19Sep 20, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- This changes the style of Burp Suite's Repeater tabs to help the testers☆29Jul 3, 2019Updated 6 years ago
- ☆17Jul 31, 2021Updated 4 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year
- ☆275Updated this week
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities☆73May 20, 2023Updated 2 years ago
- ☆25Jun 27, 2024Updated last year
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆89Jul 5, 2022Updated 3 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- A simple Google Protobuf Decoder for Burp☆43Nov 22, 2022Updated 3 years ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- A Python script to extract the serial number of a remote Fortinet device.☆33Apr 3, 2025Updated 11 months ago
- AppArmor and Seccomp profiles for Docker images☆14Dec 9, 2025Updated 3 months ago