an exploit of Server-side request forgery (SSRF)
☆54Aug 2, 2024Updated last year
Alternatives and similar repositories for ssrf-exploit
Users that are interested in ssrf-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Jul 2, 2025Updated 10 months ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 6 months ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆153May 17, 2024Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆108Dec 8, 2025Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆24Nov 6, 2023Updated 2 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆48Apr 1, 2023Updated 3 years ago
- ☆55Apr 25, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆10Jun 10, 2023Updated 2 years ago
- Shodan Dorks 2023☆244Jan 13, 2025Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆133Sep 6, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- ☆117Sep 5, 2023Updated 2 years ago
- ☆13Apr 14, 2024Updated 2 years ago
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- ☆106Dec 20, 2025Updated 5 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆46Aug 9, 2023Updated 2 years ago
- Juniper Firewalls CVE-2023-36845 - RCE☆55Dec 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A demo exploit for CVE-2021-44026, a SQL injection in Roundcube☆13Dec 22, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆243Dec 31, 2025Updated 4 months ago
- 漏洞复现、漏洞检测、漏洞利用☆14Oct 21, 2024Updated last year