forced-request / rails-rce-cve-2016-0752Links
☆10Updated 9 years ago
Alternatives and similar repositories for rails-rce-cve-2016-0752
Users that are interested in rails-rce-cve-2016-0752 are comparing it to the libraries listed below
Sorting:
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- RoR / Devise PoC in memory Backdoor☆29Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Updated 8 years ago
- Parse HTTP Security Headers☆39Updated 11 months ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 3 years ago
- Updated version of SWFIntruder☆26Updated 9 years ago
- RubySec Field Guide☆40Updated 2 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆12Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Popcorn - the JSON fuzzer☆22Updated 11 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- Faraday Continuous Scanning☆34Updated 8 years ago