A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
☆49Apr 8, 2022Updated 4 years ago
Alternatives and similar repositories for crlf-injector
Users that are interested in crlf-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- A web crawler written with pentesting in mind and some hacks for smart crawling☆29Apr 9, 2019Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆72Feb 15, 2018Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- A modified reGeorg for One-line PHP Shell.☆86Nov 18, 2018Updated 7 years ago
- Base on crawler result web path scanner.☆78Apr 26, 2014Updated 12 years ago
- Feigong,针对各种情况自由变化的mysql注入脚本,In view of the different things freely change the mysql injection script☆106Jan 24, 2017Updated 9 years ago
- a fast domain brute tool☆413Mar 2, 2018Updated 8 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Feb 2, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- sqlmap分块传输代理☆48May 24, 2019Updated 6 years ago
- Updated version of ApiTracer Pin tool☆23Apr 22, 2018Updated 8 years ago
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- a poc framework to test hosts via zoomeye sdk☆32Jun 26, 2017Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- F-Scrack is a single file bruteforcer supports multi-protocol☆308Sep 5, 2017Updated 8 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- XSS Payloads☆49Feb 2, 2016Updated 10 years ago
- SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities.☆72Jan 21, 2020Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Aug 26, 2019Updated 6 years ago
- cobalt strike 自启动脚本☆71Aug 23, 2016Updated 9 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Jun 30, 2025Updated 10 months ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- 研究成果/论文公开☆14Mar 6, 2019Updated 7 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Facebook brute forcer script☆27Jan 18, 2012Updated 14 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago