pwntester / DupeKeyInjectorLinks
DupeKeyInjector
☆135Updated 3 years ago
Alternatives and similar repositories for DupeKeyInjector
Users that are interested in DupeKeyInjector are comparing it to the libraries listed below
Sorting:
- ☆104Updated 5 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 9 months ago
- siberas JMX exploitation toolkit☆131Updated 2 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆122Updated 6 years ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- HTML5 WebSocket message fuzzer☆146Updated 6 years ago
- .NET Deserialization Passive Scanner☆46Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Proof of concept for CVE-2020-5902☆72Updated 5 years ago
- ☆43Updated 5 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 6 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 12 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- ☆148Updated 3 years ago
- Everything you need about Burp Extension Generation☆156Updated 2 years ago
- vulnerable single sign on☆148Updated last year
- The Outlook HTML Leak Test Project☆41Updated 7 years ago
- Some of my public exploits☆51Updated 4 years ago
- Burp Suite extension for JAX-RS☆65Updated 8 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆71Updated 4 years ago
- intentionally vulnerable API☆30Updated 11 months ago
- Burp extension☆58Updated 7 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 7 years ago
- ☆54Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago