A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON
☆115Mar 27, 2024Updated last year
Alternatives and similar repositories for jsmug
Users that are interested in jsmug are comparing it to the libraries listed below
Sorting:
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- ☆64Oct 17, 2025Updated 4 months ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- ☆36Jun 21, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- Hides message with invisible Unicode characters☆95Sep 29, 2024Updated last year
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆117Mar 13, 2025Updated 11 months ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- Passively check for XSS character encodings☆18Updated this week
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Feb 25, 2026Updated last week
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆236Oct 8, 2024Updated last year
- Automatically fuzz Rust projects from scratch☆59Jul 8, 2025Updated 7 months ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆356Dec 14, 2023Updated 2 years ago
- Fuzz anything with Program Environment Fuzzing☆398Jan 31, 2025Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆245Mar 28, 2024Updated last year
- A set of open-source community scripts☆65Oct 12, 2024Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆225Feb 6, 2025Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Jul 29, 2023Updated 2 years ago