neraliu / tainted-phantomjs
Tainted PhantomJS
☆53Updated 9 years ago
Related projects: ⓘ
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- ☆75Updated this week
- ☆45Updated 8 years ago
- ☆42Updated this week
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Updated 10 years ago
- ☆28Updated this week
- Hackerone disclosed report URL Aggregator☆29Updated 5 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 5 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- Files from Zeronights presentation.☆28Updated 11 years ago
- XXE vulnerability demo☆22Updated 10 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆31Updated 5 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆86Updated 7 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 7 years ago
- A fuzzing script for MitmProxy☆22Updated 9 years ago
- ☆35Updated this week
- ☆70Updated 6 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆33Updated 7 years ago
- Image size issues plugin for Burp Suite☆92Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 6 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- Popcorn - the JSON fuzzer☆22Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 8 years ago
- ☆42Updated 9 years ago