dxa4481 / Damn-Vulnerable-Redis-Container
An example of obtaining RCE via Redis and CSRF
☆76Updated 8 years ago
Alternatives and similar repositories for Damn-Vulnerable-Redis-Container
Users that are interested in Damn-Vulnerable-Redis-Container are comparing it to the libraries listed below
Sorting:
- Image size issues plugin for Burp Suite☆94Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- ☆90Updated 3 months ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 11 months ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- Mass scanner for the Java serialize bug☆151Updated 6 years ago
- Common Findings Database☆100Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- ☆70Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆167Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- XXE vulnerability demo☆22Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- ☆138Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 9 months ago