redrays-io / WS_RaceCondition_PoCLinks
Simple PoC for demonstrating Race Conditions on Websockets
☆55Updated last year
Alternatives and similar repositories for WS_RaceCondition_PoC
Users that are interested in WS_RaceCondition_PoC are comparing it to the libraries listed below
Sorting:
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- ☆36Updated 2 months ago
- Unicode Security Toolkit☆35Updated 8 months ago
- ☆55Updated 2 years ago
- ☆64Updated last month
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆55Updated last week
- ☆27Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 7 months ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 9 months ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆50Updated 3 months ago
- ☆63Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago
- My talks...☆24Updated 3 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆42Updated 4 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆35Updated 7 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 months ago
- Unicode characters that will translate a single character to multiple characters in domain names or TLD's☆42Updated 7 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆31Updated last year