raadfhaddad / Insecure-DeserializationLinks
Insecure Deserialization, PDF and lab
☆18Updated 5 years ago
Alternatives and similar repositories for Insecure-Deserialization
Users that are interested in Insecure-Deserialization are comparing it to the libraries listed below
Sorting:
- ☆32Updated 6 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 5 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Auto Recon Bash Script☆31Updated 5 months ago
- ☆22Updated 3 years ago
- ☆36Updated 5 months ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 4 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- web-based-fuzzer☆32Updated 4 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Updated last year
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Updated 5 years ago
- ☆1Updated 4 years ago
- ☆24Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- ☆16Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆37Updated 4 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Updated 5 years ago