An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition
☆28Apr 17, 2018Updated 7 years ago
Alternatives and similar repositories for spel-injection
Users that are interested in spel-injection are comparing it to the libraries listed below
Sorting:
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆183Jan 26, 2025Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Mar 2, 2026Updated last week
- PP-finder Help you find gadget for prototype pollution exploitation☆189Aug 8, 2024Updated last year
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Client-Side Prototype Pollution Tools☆86Sep 21, 2021Updated 4 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- A small script for my recon during bug hunting. Needs some modifications☆17Mar 5, 2020Updated 6 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Burp Suite extension to decrypt/encrypt any encrypted traffic (AES/RSA/Encodings and more) with custom code in any language☆220Jan 9, 2026Updated 2 months ago
- A tool for Subdomain takeovers detection☆26Oct 21, 2022Updated 3 years ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆456Oct 3, 2023Updated 2 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- ☆29May 30, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆37Mar 13, 2016Updated 9 years ago
- ☆562Mar 27, 2025Updated 11 months ago
- Client Side Prototype Pollution Scanner☆522Sep 17, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- Automated learning of regexes for DNS discovery☆390Feb 18, 2023Updated 3 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- ☆34Feb 15, 2021Updated 5 years ago