frizb / Bypassing-Web-Application-FirewallsLinks
A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers
☆276Updated 7 years ago
Alternatives and similar repositories for Bypassing-Web-Application-Firewalls
Users that are interested in Bypassing-Web-Application-Firewalls are comparing it to the libraries listed below
Sorting:
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 5 months ago
- ☆208Updated 4 years ago
- ☆231Updated 9 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆297Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆234Updated 5 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- Burp extension to perform Java Deserialization Attacks☆214Updated last year
- Damn Vulnerable eXtensive Training Environment☆106Updated 3 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆218Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆381Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆205Updated last year
- Central Repo for Burp extensions☆151Updated 3 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆123Updated 7 years ago
- ☆217Updated 3 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- Search Exploitable Software on Linux☆232Updated 2 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆158Updated 3 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆317Updated 4 months ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆334Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- ☆162Updated 7 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆330Updated 2 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆72Updated 7 years ago