Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()
☆120Jun 22, 2015Updated 10 years ago
Alternatives and similar repositories for Defeating-PHP-GD-imagecreatefromgif
Users that are interested in Defeating-PHP-GD-imagecreatefromgif are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Mysql数据库执行监控☆12Dec 10, 2019Updated 6 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- 提取phpinfo()敏感信息☆11Nov 23, 2018Updated 7 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- ☆119Apr 14, 2020Updated 5 years ago
- PostMessage extension☆102Aug 28, 2019Updated 6 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Hooks in to interesting functions and helps reverse the web app faster.☆170Jan 30, 2025Updated last year
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- A tool to find sensitive keys and passwords in Travis logs☆139Jun 27, 2021Updated 4 years ago
- code to reverse vxworks 5.x password hashes☆17Sep 14, 2016Updated 9 years ago
- ☆78Dec 15, 2015Updated 10 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,041Jun 3, 2021Updated 4 years ago
- Cross Domain XHR: A drop-in replacement for XmlHttpRequest object.☆61Jan 31, 2013Updated 13 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last week
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- Self contained htaccess shells and attacks☆1,075Feb 17, 2022Updated 4 years ago
- Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb☆264Mar 13, 2026Updated last week
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- 梧桐百科投稿通道☆22May 21, 2018Updated 7 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago