paulveillard / cybersecurity-ssrfView external linksLinks
An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries and frameworks, best guidelines and technical resources about SSRF
☆24Feb 22, 2022Updated 3 years ago
Alternatives and similar repositories for cybersecurity-ssrf
Users that are interested in cybersecurity-ssrf are comparing it to the libraries listed below
Sorting:
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- <img src=x onerroralert(1);>☆11Jul 12, 2014Updated 11 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Dec 30, 2023Updated 2 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- Multithreading loop fuzzing with `ffuf` into your subdomains list with unique results☆31May 12, 2024Updated last year
- ☆15Mar 21, 2025Updated 10 months ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- bounty collection☆41Sep 1, 2024Updated last year
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- Query builder for mongo_dart and objectory☆11Jan 26, 2026Updated 2 weeks ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- list of TryHackMe Free rooms with a guide to basic pathways.☆12Aug 14, 2023Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- ☆10Jun 26, 2017Updated 8 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Storm Elastic Search Bolt☆63Dec 17, 2023Updated 2 years ago
- ☆13Jun 26, 2025Updated 7 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 9 months ago
- Get newest public disclosed HackerOne report notifications on your Desktop☆14Jan 29, 2020Updated 6 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆11May 28, 2022Updated 3 years ago
- Minimalist repo for installing and deploying to chef solo☆26May 27, 2012Updated 13 years ago