☆385Feb 28, 2026Updated 3 weeks ago
Alternatives and similar repositories for csp-evaluator
Users that are interested in csp-evaluator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My CTF & Bug Bounty writups☆26Apr 30, 2019Updated 6 years ago
- ☆29Jul 24, 2025Updated 7 months ago
- My-CTF-Challenge☆11Oct 23, 2020Updated 5 years ago
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆752May 6, 2024Updated last year
- ☆162Dec 7, 2017Updated 8 years ago
- A collection of browser-based side channel attack vectors.☆760Mar 19, 2024Updated 2 years ago
- HackerOne Staffs☆29Dec 9, 2019Updated 6 years ago
- ☆119Mar 21, 2020Updated 6 years ago
- Prototype Pollution and useful Script Gadgets☆1,601Jan 27, 2024Updated 2 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- WebAppSec Content Security Policy☆221Mar 11, 2026Updated last week
- A simple tool to decloak/expose the bucket name behind a domain.☆22Updated this week
- Multi-language web CGI interfaces exploits.☆399Aug 22, 2022Updated 3 years ago
- PHP Runtime Vulnerability Detection☆480May 25, 2019Updated 6 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,131Apr 21, 2024Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,324Apr 18, 2023Updated 2 years ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,080Jun 15, 2021Updated 4 years ago
- What if developers could opt-into better default behaviors en masse, forcing them to pick and choose the legacy risks they want to enable…☆19Jan 9, 2023Updated 3 years ago
- ☆15May 23, 2019Updated 6 years ago
- My CTF Challenges☆216Jan 4, 2026Updated 2 months ago
- List of Trusted Types bypasses☆102Apr 15, 2024Updated last year
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- My CTF Challenges☆22Oct 10, 2023Updated 2 years ago
- ☆78Feb 16, 2020Updated 6 years ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- Security-related PHP7 OPcache abuse tools and demo☆316Jan 2, 2023Updated 3 years ago
- This library has moved to https://github.com/googleapis/sdk-platform-java/tree/main/java-common-protos.☆14Jul 19, 2023Updated 2 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 4 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆405Oct 2, 2020Updated 5 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,103Jan 3, 2026Updated 2 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- Pwn stuff.☆1,804May 31, 2022Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago