☆66Aug 25, 2021Updated 4 years ago
Alternatives and similar repositories for CORS_vulnerable_Lab-Without_Database
Users that are interested in CORS_vulnerable_Lab-Without_Database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 4 months ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 5 years ago
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆17Apr 29, 2021Updated 4 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆119Feb 16, 2025Updated last year
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Jul 31, 2023Updated 2 years ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Nov 5, 2020Updated 5 years ago
- A notification script to help with Recon Stuff☆14Jun 8, 2021Updated 4 years ago
- ☆13Aug 2, 2020Updated 5 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- Exploit code developed/reproduced by me☆89Jan 25, 2023Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆765Aug 21, 2023Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- D3CTF-2021-Official-Writeup☆18Mar 12, 2021Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- ☆576Jul 12, 2025Updated 8 months ago
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- Google Maps API checker☆79Feb 26, 2026Updated 3 weeks ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- ☆26Mar 17, 2021Updated 5 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- Writeup of CVE-2020-15906☆49Oct 26, 2020Updated 5 years ago
- WordPress <= 5.3.? DoS☆24Dec 17, 2019Updated 6 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago