kacperszurek / exploitsLinks
☆265Updated 6 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Contents for Node.Js Security Course☆342Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 6 months ago
- XXE Out of Band Server.☆171Updated 2 years ago
- A mini webserver with FTP support for XXE payloads☆332Updated last year
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆290Updated 7 months ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆263Updated 3 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated 4 months ago
- A tiny and cute URL fuzzer☆398Updated 2 years ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- Utils☆273Updated 9 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 7 years ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆316Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆349Updated 2 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆281Updated 8 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆292Updated 2 years ago
- All my infosec notes I have been building up over the years☆336Updated 6 months ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆258Updated last year
- Java deserialization exploitation lab.☆234Updated 6 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- HTTP.ninja☆151Updated 2 years ago
- Sample vulnerable code and its exploit code☆189Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆253Updated last year
- a tiny tool for swf hacking, just browse it:)☆243Updated 12 years ago
- Hunting Bugs for Fun and Profit☆270Updated 5 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆474Updated 7 years ago
- Lesser Known Web Attack Lab☆331Updated 5 years ago
- research☆151Updated last year