nikosdano / SSRF-Vulnerable-with-CurlLinks
This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-validated Curl request. I will also create a script in Python which will allow you to perform the HTTP port scan.
☆14Updated 9 years ago
Alternatives and similar repositories for SSRF-Vulnerable-with-Curl
Users that are interested in SSRF-Vulnerable-with-Curl are comparing it to the libraries listed below
Sorting:
- CORS checking☆34Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Updated 8 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 8 years ago
- ☆34Updated 6 years ago
- ☆63Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆25Updated 9 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Updated 7 years ago
- XSS payloads for edge cases☆34Updated 7 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Updated 5 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Updated 8 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- ☆43Updated 5 years ago
- A Burp Extender plugin, that will take deserialized AMF objects and encode them in XML using the Xtream library☆27Updated 10 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Updated 2 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 7 years ago
- Burp extension to passively scan for applications revealing software version numbers☆33Updated last year
- ☆25Updated 8 years ago
- Custom THP Dropper☆26Updated 7 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Updated 7 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆48Updated last year
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Updated 5 years ago
- Burp extension☆58Updated 7 years ago
- scripts used in my pentest work.☆44Updated 10 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago