Prototype Pollution Lab
☆18Nov 20, 2020Updated 5 years ago
Alternatives and similar repositories for PrototypePollution-Lab
Users that are interested in PrototypePollution-Lab are comparing it to the libraries listed below
Sorting:
- Prototype Pollution - A detailed study + hands on lab.☆15Oct 11, 2022Updated 3 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Hybrid Port Knocking System☆22Jan 11, 2021Updated 5 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆17Jun 15, 2025Updated 9 months ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 11 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A Jekyll theme for hosting documentation on GitHub Pages.☆20Jul 8, 2023Updated 2 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆120Sep 27, 2021Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- Character Entities for HTML, CSS (content) and Javascript.☆15Aug 1, 2021Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Feb 2, 2023Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- OSCP☆37Nov 24, 2021Updated 4 years ago
- Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!☆17Jan 28, 2022Updated 4 years ago
- Gem wrapper for selenium server☆19May 30, 2023Updated 2 years ago
- Tool for dictionary attack with fail2ban bypass.☆16Jan 8, 2022Updated 4 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆17Feb 17, 2022Updated 4 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- Chat Bot Security Checklist☆31Jul 4, 2019Updated 6 years ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆29Sep 2, 2022Updated 3 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆93Jun 10, 2024Updated last year
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- ☆12Aug 1, 2022Updated 3 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- TypeScript package to ease interactions with Google's batchexecute batch RPC system☆14Sep 12, 2023Updated 2 years ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆49Dec 10, 2025Updated 3 months ago