wallarm / researches
☆12Updated 6 years ago
Alternatives and similar repositories for researches:
Users that are interested in researches are comparing it to the libraries listed below
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Updated 7 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 4 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- ☆7Updated 3 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Updated 10 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 4 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago
- XXE attack tool☆31Updated 8 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago