pandaonair / Jolokia-RCELinks
☆17Updated 2 years ago
Alternatives and similar repositories for Jolokia-RCE
Users that are interested in Jolokia-RCE are comparing it to the libraries listed below
Sorting:
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 4 years ago
- ☆36Updated 10 months ago
- A Burp extension to show the Collaborator client in a tab☆24Updated 2 years ago
- ☆44Updated 4 years ago
- public dns server list for dmut project☆18Updated 2 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Updated 4 years ago
- CVE-2022-41040 nuclei template☆19Updated 3 years ago
- Authenticated SSRF in Grafana☆83Updated last year
- Additional nuclei templates☆38Updated 2 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- Compiles a list of major CDN and WAF subnets.☆66Updated this week
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Updated 3 years ago
- Spring Boot Actuator (jolokia) XXE/RCE☆23Updated 6 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆37Updated 5 years ago
- ☆33Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Updated 5 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 4 years ago
- Burp Bounty profiles☆81Updated 3 years ago
- ☆64Updated 4 years ago
- Subdomain enumeration statistics and wordlists from bugbounty scopes.☆34Updated 3 years ago
- ☆28Updated 2 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆29Updated 4 years ago
- IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)☆52Updated 2 years ago
- ☆22Updated last year
- Chameleon Wordlists☆15Updated 3 years ago