lprat / smuggling_detect
Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)
☆12Updated 5 years ago
Alternatives and similar repositories for smuggling_detect:
Users that are interested in smuggling_detect are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 5 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 5 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- miscellaneous security research stuff☆38Updated 5 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 7 years ago
- ☆34Updated 5 years ago
- Scans tcl for command injection☆36Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- ☆41Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 8 months ago
- Webmin Remote Code Execution (authenticated)☆33Updated 5 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 11 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Broken Link Hijacking Burp Extension☆56Updated 5 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆48Updated 4 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Essential tool for finding blind injection attacks.☆50Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Updated 5 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago