☆22Aug 3, 2024Updated last year
Alternatives and similar repositories for gcs_instace_takeover
Users that are interested in gcs_instace_takeover are comparing it to the libraries listed below
Sorting:
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- Extract subdomains from rapiddns.io☆22Nov 24, 2022Updated 3 years ago
- ☆16Jan 23, 2026Updated last month
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 8 months ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- Python Game Cheat Framework☆19Sep 12, 2022Updated 3 years ago
- ☆46Oct 1, 2025Updated 5 months ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- AMF Plugin for JMeter☆37May 24, 2012Updated 13 years ago
- q-Rung orthopair fuzzy mathematical operation library and q-Rung orthopair fuzzy sets mathematical operation library.☆13Jul 30, 2025Updated 7 months ago
- An efficient multi-threaded DNS resolver validator☆87Dec 1, 2020Updated 5 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆41Feb 20, 2026Updated 2 weeks ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Training course materials include advanced topics from JS and basics of React.JS☆11Mar 25, 2024Updated last year
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆31Updated this week
- Simple "postMessage logger" Chrome extension☆103May 2, 2020Updated 5 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆32Aug 4, 2014Updated 11 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- Walk the DNS tree to find which nameservers a particular zone (or "domain") uses. Mimics "dig +trace", but in Go.☆29Jan 30, 2024Updated 2 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆63May 3, 2020Updated 5 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- Repositorio del mes de intro a la web para devf 31/01/23 al 24/02/2023☆18Mar 27, 2023Updated 2 years ago
- ☆17Jan 31, 2023Updated 3 years ago
- ☆30Jun 27, 2022Updated 3 years ago