httpoxy / python-httpoxy-poc
☆11Updated 8 years ago
Alternatives and similar repositories for python-httpoxy-poc:
Users that are interested in python-httpoxy-poc are comparing it to the libraries listed below
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆20Updated last year
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 13 years ago
- ☆24Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Updated 8 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- ☆46Updated 7 years ago
- check cmd execute☆13Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- ☆14Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Memcache hacking tool.☆47Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 5 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- ☆46Updated 8 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago