p4k03n4t0r / http-request-smugglingLinks
Blog about HTTP Request Smuggling, including a demo application.
☆29Updated 3 years ago
Alternatives and similar repositories for http-request-smuggling
Users that are interested in http-request-smuggling are comparing it to the libraries listed below
Sorting:
- Prototype Pollution exploits collection☆34Updated 4 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- ☆27Updated 2 years ago
- ☆56Updated 4 years ago
- ☆23Updated 6 months ago
- Security Advisories☆34Updated last week
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆59Updated 4 years ago
- Client-Side Prototype Pollution Tools☆85Updated 4 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- ☆169Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆28Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- ☆64Updated 3 years ago
- This repo contains solution for ctf challenges☆36Updated 10 months ago
- ☆95Updated 4 years ago
- Utility for creating ZipSlip archives☆78Updated 2 years ago
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆111Updated last year
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated 2 years ago
- This is the data that powers the PortSwigger URL validation bypass cheat sheet.☆52Updated last week
- CTF challenges WriteUp☆14Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last year
- ☆85Updated 3 months ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- ☆40Updated 3 months ago
- CTF, wargame cheatsheet☆31Updated 6 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 5 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago