dxa4481 / Damn-Vulnerable-Redis-ContainerLinks
An example of obtaining RCE via Redis and CSRF
☆76Updated 9 years ago
Alternatives and similar repositories for Damn-Vulnerable-Redis-Container
Users that are interested in Damn-Vulnerable-Redis-Container are comparing it to the libraries listed below
Sorting:
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- ☆90Updated last month
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Updated 11 years ago
- ☆32Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆62Updated 11 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 5 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Exploits and research stuffs☆55Updated 3 weeks ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- ☆63Updated 12 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆96Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago