rubennati / vulnerable-php-code-examplesLinks
Examples of vulnerable PHP code
☆12Updated last year
Alternatives and similar repositories for vulnerable-php-code-examples
Users that are interested in vulnerable-php-code-examples are comparing it to the libraries listed below
Sorting:
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- ASN reconnaissance script☆131Updated 2 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- GraphQL security workshop labs☆118Updated last week
- Awesome XSS Payloads☆84Updated 9 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 3 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Shodan subdomain finder☆67Updated 5 years ago
- ☆31Updated 6 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Updated 3 weeks ago
- XSS Payload without Anything.☆104Updated 6 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- xss development frameworks, with the goal of making payload writing easier.☆152Updated last year
- Cross Origin Resource Sharing MisConfiguration Scanner☆174Updated 4 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Updated 6 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Updated 5 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆72Updated 5 years ago
- Bucky (An automatic S3 bucket discovery tool)☆198Updated 4 years ago
- A Burp Suite extension for CSRF proof of concepts.☆57Updated 2 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆106Updated 4 years ago
- ☆76Updated 5 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Updated 5 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Updated 5 years ago
- DNS and Target HTTP History Local Storage and Search☆63Updated 4 years ago
- The scripts I write to help me on my bug bounty hunting☆123Updated 4 years ago
- A python based blind SQL injection exploitation script☆142Updated 6 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 6 months ago
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Updated 6 years ago