nikosdano / SSRF-Vulnerable-with-CurlView external linksLinks
This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-validated Curl request. I will also create a script in Python which will allow you to perform the HTTP port scan.
☆14Sep 20, 2016Updated 9 years ago
Alternatives and similar repositories for SSRF-Vulnerable-with-Curl
Users that are interested in SSRF-Vulnerable-with-Curl are comparing it to the libraries listed below
Sorting:
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- ☆13Oct 19, 2022Updated 3 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 6 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- web scanner☆23Jan 29, 2019Updated 7 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Chrome Extension for XSS Hunter Payloads☆41Sep 7, 2016Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- 带回显版本的漏洞利用脚本☆25Mar 5, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 13 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Apr 10, 2022Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- 轻量级漏洞验证和利用框架☆32May 10, 2022Updated 3 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- CB API scripts for IR, administration, etc.☆32Jun 3, 2019Updated 6 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated last month
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago