mpgn / ByP-SOPLinks
π΄ββ οΈ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files π΄ββ οΈ
β202Updated 6 years ago
Alternatives and similar repositories for ByP-SOP
Users that are interested in ByP-SOP are comparing it to the libraries listed below
Sorting:
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.β264Updated 3 years ago
- researchβ151Updated last year
- HTTP.ninjaβ151Updated 2 years ago
- β266Updated 6 years ago
- Simple "postMessage logger" Chrome extensionβ100Updated 5 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cerβ¦β289Updated 9 months ago
- Burp Suite Extension to monitor new scopeβ200Updated 4 years ago
- SHELLING - a comprehensive OS command injection payload generatorβ111Updated 6 years ago
- Extension to log iframe and cross window communications.β55Updated 2 years ago
- β130Updated 4 years ago
- Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.β71Updated 3 years ago
- A natural evolution of Burp Suite's Repeater toolβ199Updated last year
- DNS rebinding toolkitβ255Updated 2 years ago
- Payloads for CRLF Injectionβ225Updated last year
- Chrome extension to aid in finding DOMXSS by simple taint analysis of string values.β80Updated 6 years ago
- A mini webserver with FTP support for XXE payloadsβ333Updated last year
- exploit for ImageMagick's uninitialized memory disclosure in gif coderβ282Updated 8 years ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.β317Updated 2 years ago
- Pentest/BugBounty progress control with scanning modulesβ282Updated 5 years ago
- jsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints.β154Updated 4 years ago
- Automatic tool for DNS rebinding-based SSRF attacksβ304Updated 5 years ago
- XXE Out of Band Server.β172Updated 2 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β356Updated 8 months ago
- A tool to find sensitive keys and passwords in Travis logsβ141Updated 4 years ago
- Utilsβ273Updated 9 years ago
- Sample vulnerable code and its exploit codeβ189Updated 4 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competitionβ102Updated 5 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains β¦β223Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes β¦β262Updated 3 years ago
- Various Payload wordlistsβ236Updated 6 months ago