POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet
☆30May 25, 2017Updated 8 years ago
Alternatives and similar repositories for poc-csrf
Users that are interested in poc-csrf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- Getting Started with Docker☆15Oct 30, 2016Updated 9 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 3 months ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 5 months ago
- ☆13Oct 15, 2018Updated 7 years ago
- Python3 script to interact with and retrieve data about your FordPass enabled vehicle☆12Apr 4, 2021Updated 5 years ago
- A simple chatting application built on top of the NodeJS platform, with Socket.io and ExpressJS☆12Apr 22, 2014Updated 11 years ago
- ☆10Apr 21, 2021Updated 4 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Apr 21, 2023Updated 2 years ago
- Quickly search the digits of Pi☆20Updated this week
- Example of Spin app written in Java using TeaVM-WASI and wit-bindgen☆12Dec 7, 2022Updated 3 years ago
- Cumulus. Threat modeling the Clouds.☆28Oct 27, 2025Updated 5 months ago
- Allows extracting dto from objects and getting objects from dto☆11Jan 27, 2026Updated 2 months ago
- Launcher utility to handle custom game URL protocols supported on joinme.click☆12Mar 27, 2026Updated 2 weeks ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- Fork of https://code.google.com/p/nginx-sticky-module/ with important patches applied☆29Jun 10, 2014Updated 11 years ago
- n11.com api client☆13Mar 4, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- A scanner to detect the use of stolen FireEye red team tools☆20Dec 18, 2020Updated 5 years ago
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- BKM Express gateway for Omnipay payment processing library☆13Jun 12, 2017Updated 8 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆67Oct 24, 2021Updated 4 years ago
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆33Jul 9, 2017Updated 8 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Nov 29, 2018Updated 7 years ago
- Sim808 files☆12Jan 18, 2018Updated 8 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆32Jun 5, 2020Updated 5 years ago