mattiasgrenfeldt / bachelors-thesis-http-request-smugglingView external linksLinks
☆72Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for bachelors-thesis-http-request-smuggling
Users that are interested in bachelors-thesis-http-request-smuggling are comparing it to the libraries listed below
Sorting:
- ☆13Feb 18, 2022Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- ☆33Oct 29, 2020Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- ☆16Jul 31, 2021Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆98Sep 24, 2023Updated 2 years ago
- Python script to launch burp scans automatically☆33Jul 18, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Nov 8, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Jun 22, 2020Updated 5 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- ☆96Oct 1, 2021Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Jul 31, 2020Updated 5 years ago
- A tool to test working urls.☆43Nov 17, 2020Updated 5 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated 2 weeks ago
- Wrapper around LinkFinder to quickly determine whether endpoints have been added/removed to JavaScript files.☆41Dec 27, 2019Updated 6 years ago
- ☆709Nov 27, 2024Updated last year
- ☆561Mar 27, 2025Updated 10 months ago
- Unofficial documentation for the great tool Param Miner☆184Aug 21, 2022Updated 3 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆26Jan 6, 2021Updated 5 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Dec 31, 2022Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago