A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.
☆35Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for DesyncCL0
Users that are interested in DesyncCL0 are comparing it to the libraries listed below
Sorting:
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆13Mar 6, 2025Updated 11 months ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- ☆19Apr 16, 2025Updated 10 months ago
- ☆57Sep 27, 2022Updated 3 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second修复内存溢出等bug☆14Nov 25, 2023Updated 2 years ago
- Web directory and file discovery.☆18Oct 31, 2022Updated 3 years ago
- ☆12May 31, 2023Updated 2 years ago
- RASP project for Android app protection☆14Oct 11, 2024Updated last year
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆24Jan 26, 2026Updated last month
- A playground to test various prompt injection techniques and bypasses.☆20Mar 31, 2023Updated 2 years ago
- ☆51Jun 13, 2024Updated last year
- Directory scans☆85Jan 7, 2026Updated last month
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- Simple script to convert and obscure any IP address of any host.☆23Dec 16, 2017Updated 8 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆52Mar 12, 2023Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzz…☆21Jun 29, 2023Updated 2 years ago
- ☆25Apr 28, 2024Updated last year
- Calculate favicon hash for SHODAN☆93Oct 11, 2024Updated last year
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- Get list of subsidiaries for a selected company☆31Dec 21, 2024Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago