incredibleindishell / CORS_vulnerable_Lab-Without_Database
☆66Updated 3 years ago
Alternatives and similar repositories for CORS_vulnerable_Lab-Without_Database:
Users that are interested in CORS_vulnerable_Lab-Without_Database are comparing it to the libraries listed below
- ☆48Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Writeup of CVE-2020-15906☆47Updated 4 years ago
- ☆59Updated 8 months ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- Tools, Resources & Helpful Tips☆14Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆84Updated last year
- ☆36Updated 4 years ago
- Subdomain finder☆10Updated this week
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- A collection of simple tools and poc-builders☆39Updated 2 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Updated 5 years ago
- Stay within program scope☆37Updated 2 years ago
- Find orphaned IP's on cloud services☆29Updated 5 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆46Updated 3 years ago
- ☆25Updated 2 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Go fish for AWS EIPs☆46Updated 3 years ago
- A python library to automate time-based blind SQL injection☆51Updated 5 years ago
- ☆26Updated 2 years ago