mattiasgrenfeldt / bachelors-thesis-http-request-smugglingLinks
☆72Updated 3 years ago
Alternatives and similar repositories for bachelors-thesis-http-request-smuggling
Users that are interested in bachelors-thesis-http-request-smuggling are comparing it to the libraries listed below
Sorting:
- ☆94Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆37Updated 4 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆32Updated 5 years ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- ☆56Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆44Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆41Updated 4 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- HTTP request smuggling tools☆18Updated 4 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- ☆28Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- A collection of scripts for bug-bounty related stuff☆38Updated 4 years ago
- ☆44Updated 5 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆63Updated 5 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- ☆16Updated 3 years ago
- A collection of my Semgrep rules☆49Updated last year
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Broken Link Hijacking Burp Extension☆57Updated 5 years ago
- ☆24Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- a tool that compiles a csv of all h1 program stats☆47Updated last year
- ☆22Updated 2 years ago