goku-KaioKen / intigritiLinks
☆13Updated 2 years ago
Alternatives and similar repositories for intigriti
Users that are interested in intigriti are comparing it to the libraries listed below
Sorting:
- All the labs in this repository simulate real world bugs I found in the wild☆194Updated last year
- Writeup CTF☆22Updated 3 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆162Updated 3 years ago
- Deriving RSA public keys from message-signature pairs☆356Updated last year
- Prototype Pollution - A detailed study + hands on lab.☆15Updated 3 years ago
- Content-Type Research☆644Updated 5 months ago
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆251Updated 3 years ago
- IIS shortname scanner written in Go☆347Updated 2 years ago
- ☆146Updated 4 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆386Updated 5 years ago
- A subdomain fuzzing tool☆169Updated last year
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆185Updated last year
- Client Side Prototype Pollution Scanner☆522Updated 3 years ago
- Bambdas collection for Burp Suite Professional and Community.☆424Updated last week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆927Updated 3 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆554Updated 8 months ago
- A fancier postMessage tracker with Chrome Manifest version V3 support and a few additional features, inspired by Frans Rosens postmessage…☆103Updated 2 months ago
- ☆119Updated last year
- TUDO - A vulnerable PHP Web Application☆123Updated 2 years ago
- A tool to generate wordlists based on case☆28Updated last year
- ☆27Updated 5 years ago
- Smart context-based SSRF vulnerability scanner.☆361Updated 3 years ago
- ☆249Updated 4 years ago
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆230Updated last year
- bug bounty disclosed reports☆121Updated 9 months ago
- ☆99Updated 2 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆301Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆182Updated last year
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Updated last year