An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition
☆28Apr 17, 2018Updated 7 years ago
Alternatives and similar repositories for spel-injection
Users that are interested in spel-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Feb 7, 2023Updated 3 years ago
- A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers.☆49Aug 8, 2025Updated 7 months ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- ☆17Nov 15, 2022Updated 3 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- Random utilities from my security projects that might be useful to others☆183Jan 26, 2025Updated last year
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PP-finder Help you find gadget for prototype pollution exploitation☆189Aug 8, 2024Updated last year
- Client-Side Prototype Pollution Tools☆88Sep 21, 2021Updated 4 years ago
- A tool for Subdomain takeovers detection☆26Oct 21, 2022Updated 3 years ago
- ☆29May 30, 2024Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Burp Suite extension to decrypt/encrypt any encrypted traffic (AES/RSA/Encodings and more) with custom code in any language☆220Jan 9, 2026Updated 2 months ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆38Mar 13, 2016Updated 10 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- druid数据库密码解密☆37Apr 7, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆458Oct 3, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- Custom Linux/Windows VMware UEFI ROMS for VMware Workstation Pro 17.6.3☆28Nov 15, 2025Updated 4 months ago
- A small script for my recon during bug hunting. Needs some modifications☆17Mar 5, 2020Updated 6 years ago