☆66Aug 25, 2021Updated 4 years ago
Alternatives and similar repositories for CORS_vulnerable_Lab-Without_Database
Users that are interested in CORS_vulnerable_Lab-Without_Database are comparing it to the libraries listed below
Sorting:
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 3 months ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Nov 5, 2020Updated 5 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 4 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Feb 16, 2025Updated last year
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- ☆13Aug 2, 2020Updated 5 years ago
- A notification script to help with Recon Stuff☆14Jun 8, 2021Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Jul 31, 2023Updated 2 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- ☆21Dec 15, 2020Updated 5 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Google Maps API checker☆78Updated this week
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- ☆562Mar 27, 2025Updated 11 months ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- ☆576Jul 12, 2025Updated 7 months ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- An epic web shell☆83Jun 10, 2025Updated 8 months ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆762Aug 21, 2023Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago