topavankumarj / Vulnerable-OAuth2.0-ApplicationLinks
☆10Updated 3 years ago
Alternatives and similar repositories for Vulnerable-OAuth2.0-Application
Users that are interested in Vulnerable-OAuth2.0-Application are comparing it to the libraries listed below
Sorting:
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- ☆48Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Updated 5 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- ☆16Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated 2 years ago
- ☆32Updated last year
- ☆36Updated 11 months ago
- A BurpSuite plugin for BBRF☆25Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- ☆24Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 4 years ago
- ☆95Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- CVE PoCs☆21Updated 5 years ago
- Droz_scan is a automated script, that runs all the queries of drozer in a single run☆26Updated 2 years ago
- ☆19Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆22Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- A powerful Burp extension to make bounty rain☆14Updated 3 years ago
- ☆32Updated 6 years ago