A step by step workshop to exploit various vulnerabilities in Node.js and Java applications
☆156Mar 17, 2024Updated last year
Alternatives and similar repositories for exploit-workshop
Users that are interested in exploit-workshop are comparing it to the libraries listed below
Sorting:
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Apr 28, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- You can read the writeup on this script here☆274Jul 12, 2020Updated 5 years ago
- ☆27Jul 2, 2020Updated 5 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆93Jun 10, 2024Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- S2-061 CVE-2020-17530☆29Dec 22, 2020Updated 5 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplie…☆282Dec 21, 2020Updated 5 years ago
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- Slides from various talks that I've given over the years☆118Aug 14, 2023Updated 2 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- ☆112Oct 23, 2020Updated 5 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆222Jan 4, 2021Updated 5 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆762Aug 21, 2023Updated 2 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Jul 12, 2021Updated 4 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- Unpack a JavaScript Source Map back into filesystem structure☆184Oct 9, 2020Updated 5 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- A tool to automate the boring process of APK recon☆345Sep 30, 2022Updated 3 years ago
- A collection of simple tools and poc-builders☆39Jul 22, 2025Updated 7 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago