masatokinugawa / filterbypassView external linksLinks
Browser's XSS Filter Bypass Cheat Sheet
☆1,151May 6, 2017Updated 8 years ago
Alternatives and similar repositories for filterbypass
Users that are interested in filterbypass are comparing it to the libraries listed below
Sorting:
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- 🔪Browser logic vulnerabilities☆697Jan 23, 2021Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,059Jul 31, 2024Updated last year
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,897Sep 27, 2021Updated 4 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,117Apr 21, 2024Updated last year
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Collection of CTF Web challenges I made☆2,821Aug 31, 2025Updated 5 months ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,129Dec 16, 2024Updated last year
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Welcome to the XSS Challenge Wiki!☆1,597Jun 24, 2020Updated 5 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,376Sep 14, 2023Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,280Apr 13, 2024Updated last year
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,353Aug 28, 2025Updated 5 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,479Sep 4, 2025Updated 5 months ago
- Awesome XSS stuff☆5,054Oct 30, 2024Updated last year
- Automatically exported from code.google.com/p/domxsswiki☆546May 12, 2018Updated 7 years ago
- List of XSS Vectors/Payloads☆1,360Jan 14, 2026Updated last month
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,810Nov 10, 2023Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,891May 15, 2023Updated 2 years ago
- Prototype Pollution and useful Script Gadgets☆1,581Jan 27, 2024Updated 2 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆479Jan 1, 2018Updated 8 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,239Jan 8, 2026Updated last month
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆550Jun 12, 2017Updated 8 years ago
- ☆2,315Dec 8, 2023Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,770Apr 26, 2024Updated last year
- Code-Audit-Challenges☆991Nov 17, 2018Updated 7 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,502Jan 21, 2020Updated 6 years ago
- a fast domain brute tool☆414Mar 2, 2018Updated 7 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,468Jan 9, 2025Updated last year
- A collection of pentest and development tips☆1,126May 26, 2022Updated 3 years ago
- ☆834Nov 13, 2023Updated 2 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆799Nov 7, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,741Dec 4, 2025Updated 2 months ago