ianare / exif-samples
Sample images for testing Exif metadata retrieval.
☆605Updated this week
Alternatives and similar repositories for exif-samples:
Users that are interested in exif-samples are comparing it to the libraries listed below
- A curated list wordlists for bruteforcing and fuzzing☆899Updated 7 months ago
- list of regex patterns for oauth / api tokens with provided source☆257Updated 3 months ago
- ExifTool meta information reader/writer☆3,667Updated this week
- this html file creates a csrf poc form to any http request.☆272Updated 2 years ago
- Open Redirection Analyzer☆775Updated 2 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆301Updated 10 months ago
- API Fuzzer which allows to fuzz request attributes using common pentesting techniques and lists vulnerabilities☆393Updated 7 years ago
- Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!☆361Updated last year
- An extension for checking if .git is exposed in visited websites☆419Updated last week
- BugBountyTips☆407Updated 10 months ago
- ☆232Updated 3 years ago
- A Security Tool for Enumerating WebSockets☆345Updated 3 years ago
- Free, libre, effective, and data-driven wordlists for all!☆600Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆730Updated 4 years ago
- Subdomain takeover vulnerability checker☆1,187Updated 7 months ago
- Real-world infosec wordlists, updated regularly☆1,486Updated this week
- A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.☆306Updated 11 months ago
- A collection of regexes for every possbile use☆417Updated last year
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆612Updated 2 years ago
- XSS payloads for exploiting Markdown syntax☆469Updated 6 months ago
- Awesome information for WebSockets security research☆267Updated 3 years ago
- This repository contains payload to test NoSQL Injections☆357Updated 3 years ago
- Content-Type Research☆613Updated last year
- A fuzzer for detecting open redirect vulnerabilities☆746Updated 9 months ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆224Updated 3 years ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,261Updated last week
- Recon Methodology☆91Updated 3 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆359Updated 4 years ago
- A wordlist of API names for web application assessments☆808Updated 2 months ago
- A collection of templates for bug bounty reporting☆396Updated this week