Extract uncompiled, uncompressed SPA code from Webpack source maps.
-
Updated
Apr 16, 2022 - Python
Extract uncompiled, uncompressed SPA code from Webpack source maps.
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
WEB SERVICE SECURITY ASSESSMENT TOOL
Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Here you can get full exploit for SAP NetWeaver AS JAVA
Joomla! < 4.2.8 - Unauthenticated information disclosure
Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)
A set of YARA rules for the AIL framework to detect leak or information disclosure
Sniper. Passive Secrets Hunting.🚬
AfterLogic Products Vulnerabilities
CVE-2020-14179 Scanner
A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.
Exploit Code, notes, and resources to accompany PortSwiggers' WebAcademy Labs.
Writeups for portswigger labs.
Notes from Portswigger
EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure
Quick DNS Zone Transfer
Utility to scan wordpress installations using their on-by-default REST endpoints
SOUND4 Impact/Pulse/First/Eco <=2.x - Information Disclosure
A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal
Add a description, image, and links to the information-disclosure topic page so that developers can more easily learn about it.
To associate your repository with the information-disclosure topic, visit your repo's landing page and select "manage topics."