tsug0d / LearnJavaVulnerabilityLinks
Things help you get started with Java Vulnerability
☆75Updated 2 years ago
Alternatives and similar repositories for LearnJavaVulnerability
Users that are interested in LearnJavaVulnerability are comparing it to the libraries listed below
Sorting:
- Burp Extensions Api☆183Updated last week
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆112Updated last year
- ☆14Updated 5 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆275Updated 2 years ago
- Simple portforwarder for monitor traffic, detect patterns and replace response.☆25Updated 3 years ago
- ☆415Updated 3 years ago
- Pentest Q&A trick written in Vietnamese☆10Updated 6 years ago
- Collection of my capture-the-flag web challenge in any levels☆116Updated 2 years ago
- ☆89Updated 5 years ago
- jolokia-exploitation-toolkit☆299Updated 11 months ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆229Updated last year
- Examples for using the Montoya API with Burp Suite☆164Updated 2 weeks ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆213Updated 9 months ago
- My CTF writeups☆17Updated 5 years ago
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆180Updated last year
- Nuclei Templates to reproduce Cracking the lens's Research☆127Updated 3 years ago
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆323Updated last year
- Burp Extension for a passive scanning JS files for endpoint links.☆176Updated 6 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆363Updated 2 years ago
- ☆41Updated 2 years ago
- Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.☆207Updated 2 weeks ago
- Finding Java gadget chains with CodeQL☆183Updated 10 months ago
- Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules☆104Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- ctf writeups☆62Updated 3 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Updated last year
- tetctf2020_amf_writeups☆23Updated 4 years ago
- This is the data that powers the PortSwigger URL validation bypass cheat sheet.☆56Updated last month
- a repository of all the CTF challenges I've made for public events☆58Updated 3 months ago