stephenbradshaw / breakableflask
Simple vulnearable Flask web application
☆26Updated 4 years ago
Alternatives and similar repositories for breakableflask:
Users that are interested in breakableflask are comparing it to the libraries listed below
- Cheatsheets on security vulnerabilities and exploits.☆33Updated 5 years ago
- A XSS Payload in a gif file☆42Updated 7 years ago
- Writeups for all the HTB machines I have done☆61Updated last year
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆35Updated 2 weeks ago
- A Burp plugin to dump HTTP(S) requests/responses to a file system☆24Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- random notes☆45Updated 6 months ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 4 years ago
- A python library to automate time-based blind SQL injection☆51Updated 5 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Source for Pentester Land☆32Updated 2 years ago
- A tool written in python for scraping firebase data☆42Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Updated 2 years ago
- A XPath injection demonstration application☆21Updated 4 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- Simple Server Side Request Forgery services enumeration tool.☆54Updated 6 years ago
- ☆60Updated 6 years ago
- Collection of content discovery wordlists in one wordlist.☆37Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- My writeups of various CTFs & security challenges☆70Updated 7 months ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- A tool to evaluate Content Security Policies.☆70Updated 4 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Updated 6 years ago