yuriisanin / svg2raster-cheatsheetLinks
A cheatsheet for exploiting server-side SVG rasterization.
☆30Updated 3 years ago
Alternatives and similar repositories for svg2raster-cheatsheet
Users that are interested in svg2raster-cheatsheet are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- ☆32Updated last year
- Security Advisories☆34Updated 3 weeks ago
- ☆169Updated 4 years ago
- ☆95Updated 4 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- ☆21Updated 2 months ago
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 weeks ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 5 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 10 months ago
- ☆56Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 8 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Stay within program scope☆37Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- ☆26Updated 3 years ago
- ☆72Updated 4 years ago
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- ☆27Updated 2 years ago
- ☆36Updated 10 months ago
- ☆41Updated last week
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆26Updated 5 months ago