yuriisanin / svg2raster-cheatsheetLinks
A cheatsheet for exploiting server-side SVG rasterization.
☆30Updated 3 years ago
Alternatives and similar repositories for svg2raster-cheatsheet
Users that are interested in svg2raster-cheatsheet are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Security Advisories☆34Updated last month
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- ☆30Updated last year
- ☆169Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- ☆94Updated 3 years ago
- ☆26Updated 2 years ago
- Stay within program scope☆37Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 7 months ago
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ☆56Updated 4 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆28Updated 10 months ago
- ☆16Updated 2 years ago
- ☆26Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆48Updated 4 years ago
- ☆36Updated 7 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 2 months ago