Proof-of-concept CORS exploitation tool.
☆35Sep 7, 2019Updated 6 years ago
Alternatives and similar repositories for cef
Users that are interested in cef are comparing it to the libraries listed below
Sorting:
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- zhttp是一个对net/http标准库的封装,参考了python中著名的requests库☆14Apr 19, 2024Updated last year
- ☆24Feb 24, 2019Updated 7 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- A list of REST API URL paths for use in blackbox API end-point discovery☆25Jul 13, 2018Updated 7 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- A Go implementation of dirsearch.☆43Mar 10, 2019Updated 6 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆13Jul 18, 2025Updated 7 months ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Feb 4, 2023Updated 3 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Apr 4, 2017Updated 8 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Example steps to run Prometheus in Kubernetes and scrape the infrastructure and apps☆12Nov 4, 2016Updated 9 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Run python from a single exe☆35May 1, 2022Updated 3 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Nov 26, 2017Updated 8 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- ☆14Jan 7, 2022Updated 4 years ago