kunte0 / phar-jpg-polyglotLinks
Phar + JPG Polyglot generator and playground (CTF CODE)
☆89Updated 6 years ago
Alternatives and similar repositories for phar-jpg-polyglot
Users that are interested in phar-jpg-polyglot are comparing it to the libraries listed below
Sorting:
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆108Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆129Updated 5 years ago
- Root shell PoC for CVE-2021-3156☆66Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆40Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆163Updated 9 months ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- Enumerate / Dump Docker Registry☆177Updated last year
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆136Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆66Updated 2 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆48Updated 2 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- Aspx reverse shell☆108Updated 5 years ago
- SSTI Payload Generator☆91Updated 2 years ago
- Exploits targeting Symfony☆203Updated 8 months ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆180Updated 3 years ago
- ☆160Updated 3 years ago
- This repo contains all the injections mentioned in my talk and enumerators.☆126Updated last year
- ☆119Updated 2 years ago
- TUDO - A vulnerable PHP Web Application☆111Updated 2 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- Wordlist to bruteforce for LFI☆123Updated 5 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆57Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆321Updated last year
- ☆166Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- Exploit for CVE-2021-3129☆65Updated 4 years ago
- ☆162Updated last month
- Burpsuite plugin for Interact.sh☆222Updated 11 months ago