jakabakos / CVE-2017-9096-iText-XXEView external linksLinks
☆13May 18, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2017-9096-iText-XXE
Users that are interested in CVE-2017-9096-iText-XXE are comparing it to the libraries listed below
Sorting:
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Simple PoC package for testing for dependency confusion vulnerabilities.☆10Feb 9, 2021Updated 5 years ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- ☆17May 21, 2022Updated 3 years ago
- Nuclei templates for drupal vulns... far from perfect☆17Jan 9, 2025Updated last year
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 4 years ago
- ☆22Jun 24, 2024Updated last year
- Dig through the Wayback Machine and find sensitive or forgotten files exposed by web servers over time.☆27Mar 27, 2025Updated 10 months ago
- ☆20Dec 7, 2021Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆27Sep 11, 2023Updated 2 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Apr 2, 2025Updated 10 months ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆14Jan 23, 2026Updated 3 weeks ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- ☆13Mar 6, 2025Updated 11 months ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Apache OfBiz Auth Bypass Scanner for CVE-2023-51467☆11Dec 31, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆10Jan 8, 2023Updated 3 years ago
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- burp suite插件☆13Jul 9, 2023Updated 2 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- ☆21Dec 4, 2014Updated 11 years ago
- 编译时使用7z压缩指定so到assets目录,并在运行时解压执行.达到压缩apk体积☆14Dec 12, 2019Updated 6 years ago