efchatz / HTTP3-attacksLinks
HTTP3-attacks (CVE-2022-30592)
☆77Updated 2 years ago
Alternatives and similar repositories for HTTP3-attacks
Users that are interested in HTTP3-attacks are comparing it to the libraries listed below
Sorting:
- ☆72Updated 3 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆72Updated 4 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- ☆42Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆10Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- Postfix SMTP Smuggling - Expect Script POC☆23Updated last year
- [PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)☆90Updated 2 years ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Updated 2 years ago
- Security Advisories☆34Updated 2 weeks ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated 4 months ago
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- ☆40Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- ☆112Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 3 years ago
- KeyTrap (DNSSEC)☆43Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated last year
- ☆31Updated 2 years ago
- Monitoring the Cloud Landscape☆88Updated this week
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39Updated 5 months ago