☆1,200Sep 2, 2022Updated 3 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆952Dec 31, 2021Updated 4 years ago
- ☆284Nov 12, 2021Updated 4 years ago
- Prototype Pollution and useful Script Gadgets☆1,584Jan 27, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,164May 26, 2023Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,024Updated this week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,075Aug 14, 2024Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,062Jan 2, 2024Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,881Apr 5, 2024Updated last year
- ☆562Mar 27, 2025Updated 11 months ago
- Reverse proxies cheatsheet☆1,855Nov 4, 2023Updated 2 years ago
- ☆694Jul 4, 2022Updated 3 years ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,448Feb 7, 2026Updated 3 weeks ago
- ☆755Jun 26, 2024Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,302Apr 18, 2023Updated 2 years ago
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year
- jolokia-exploitation-toolkit☆310Dec 19, 2024Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,208Jan 31, 2026Updated 3 weeks ago
- Contextual Content Discovery Tool☆3,096Apr 29, 2024Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,837Jan 1, 2025Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,034Jun 25, 2025Updated 8 months ago
- A malicious LDAP server for JNDI injection attacks☆1,076Sep 28, 2023Updated 2 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,651Updated this week
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,773Apr 26, 2024Updated last year
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Rockyou for web fuzzing☆3,023Feb 11, 2026Updated 2 weeks ago
- List DTDs and generate XXE payloads using those local DTDs.☆648Feb 21, 2024Updated 2 years ago
- ☆810Jul 28, 2024Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,674Dec 23, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,348Sep 30, 2024Updated last year
- Hidden parameters discovery suite☆2,027Sep 8, 2024Updated last year
- ☆707Nov 27, 2024Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,487Sep 4, 2025Updated 5 months ago
- Java RMI Vulnerability Scanner☆916Jul 3, 2024Updated last year
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆659Aug 28, 2025Updated 6 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago