iagox86 / poracle
☆91Updated 6 years ago
Alternatives and similar repositories for poracle:
Users that are interested in poracle are comparing it to the libraries listed below
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- A Java serializer in JavaScript☆81Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- ☆70Updated 7 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Updated 8 years ago
- ☆84Updated 8 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 7 years ago
- ☆33Updated 3 years ago
- public exploits☆35Updated last year
- A brute force program to test weak accounts configured to access a JMX Registry☆35Updated 8 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 11 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆99Updated 5 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tainted PhantomJS☆52Updated 9 years ago
- ☆54Updated 6 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- CTF Write-ups☆26Updated 6 years ago
- DupeKeyInjector☆135Updated 3 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 4 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Study about HQL injection exploitation.☆51Updated 8 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- ☆73Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago