☆170Oct 4, 2021Updated 4 years ago
Alternatives and similar repositories for ghostinthepdf
Users that are interested in ghostinthepdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- ☆563Mar 27, 2025Updated 11 months ago
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆968Jan 10, 2025Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- a deterministic finite automata ranker☆72Feb 6, 2022Updated 4 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Free, libre, effective, and data-driven wordlists for all!☆648Sep 10, 2021Updated 4 years ago
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆679Jan 28, 2024Updated 2 years ago
- Automated learning of regexes for DNS discovery☆390Feb 18, 2023Updated 3 years ago
- ☆279Jun 27, 2022Updated 3 years ago
- Reverse proxies cheatsheet☆1,855Nov 4, 2023Updated 2 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆433Nov 28, 2018Updated 7 years ago
- Utility for creating ZipSlip archives☆84Feb 9, 2023Updated 3 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- ☆63Mar 1, 2023Updated 3 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,155Jan 21, 2026Updated 2 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆350Jun 13, 2021Updated 4 years ago
- ☆705Nov 27, 2024Updated last year
- ☆186Jun 17, 2025Updated 9 months ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- Subdomain enumeration statistics and wordlists from bugbounty scopes.☆34Mar 24, 2022Updated 3 years ago
- ☆30Sep 5, 2025Updated 6 months ago
- List DTDs and generate XXE payloads using those local DTDs.☆651Feb 21, 2024Updated 2 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆27Nov 23, 2017Updated 8 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,296Jan 26, 2024Updated 2 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- ☆144Mar 10, 2026Updated last week
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Apache Solr Injection Research☆580Jan 28, 2020Updated 6 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- Prototype Pollution and useful Script Gadgets☆1,601Jan 27, 2024Updated 2 years ago