raadfhaddad / Insecure-Deserialization
Insecure Deserialization, PDF and lab
☆17Updated 5 years ago
Alternatives and similar repositories for Insecure-Deserialization:
Users that are interested in Insecure-Deserialization are comparing it to the libraries listed below
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- ☆34Updated last month
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- ☆22Updated 3 years ago
- A Burp extension to show the Collaborator client in a tab☆23Updated 2 years ago
- Updated 4 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- ☆24Updated 4 years ago
- web-based-fuzzer☆32Updated 4 years ago
- Auto Recon Bash Script☆31Updated 2 months ago
- ☆16Updated 2 years ago
- ☆31Updated 5 years ago
- Subdomain finder☆10Updated 2 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- CVE, reports, research☆17Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆39Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- Subvenkon is a subdomain enumerator from Venkon☆23Updated 4 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- ☆36Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated last year
- Pythonize Intruder Payload☆13Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated 9 months ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Updated last year