WAF bypass PoC
☆51Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for waf-btk
Users that are interested in waf-btk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go☆18Jun 1, 2022Updated 3 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Apr 22, 2024Updated last year
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆28Aug 7, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Apr 10, 2026Updated last week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆201Jan 6, 2026Updated 3 months ago
- ☆144Mar 10, 2026Updated last month
- Coalfire AWS RAMP/pak Reference Architecture☆37Mar 27, 2026Updated 3 weeks ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Selectively permeable boundary for AI agents☆46Apr 9, 2026Updated last week
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- Service Control Policies that have been Latacora recommended all wrapped up in terraform that is easy to attach to an OU.☆27May 24, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆65Feb 26, 2019Updated 7 years ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆76Apr 14, 2025Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Nuclei plugins to audit Chrome extensions☆66Jul 16, 2024Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- BPFView: Process and Network Activity Correlation☆34May 17, 2025Updated 11 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- Prescriptive Sentinel policies that can be used to establish secure Terraform configuration for Amazon Web Services networking infrastruc…☆13Jan 12, 2026Updated 3 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 7 months ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago