forced-request / rails-rce-cve-2016-0752
☆10Updated 9 years ago
Alternatives and similar repositories for rails-rce-cve-2016-0752:
Users that are interested in rails-rce-cve-2016-0752 are comparing it to the libraries listed below
- Tainted PhantomJS☆53Updated 9 years ago
- RoR / Devise PoC in memory Backdoor☆29Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Updated 10 years ago
- Parse HTTP Security Headers☆37Updated 6 months ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- RubySec Field Guide☆40Updated 2 years ago
- ☆11Updated 7 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Updated 8 years ago
- Updated version of SWFIntruder☆26Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- ☆24Updated 9 years ago
- ☆19Updated 11 years ago
- Various things to share☆11Updated 6 years ago
- cve-2014-0130 rails directory traversal vuln☆19Updated 7 years ago
- ☆12Updated 9 years ago
- Converts burp's sitemap to sulley's fuzzing script☆12Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago
- Faraday Continuous Scanning☆33Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆19Updated 9 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 7 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago