This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
-
Updated
Aug 21, 2023 - PHP
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Work in progress...
CMS auto detect and exploit.
Advanced Web Browser Fingerprinting
All in one Pentest methodologies - Tools and commands | Where compiled all common materials for pentester
Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky
This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).
PHPUtilities provides various utility scripts.
Exploit the vulnerability to install arbitrary applications in k61v1 without ROOT
The purpose of this program is to help beginner and intermediate users to hone their web exploitation and development skills by mirroring a vunerable e-commerce application.
Steganografi untuk menyisipkan payload PHP dalam file gambar, digunakan untuk pengujian keamanan web di lingkungan terkontrol.
This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
This repository is designed for IDOR vulnerabilities in a web application.
This repository offers an in-depth resource for foundational and advanced concepts in cybersecurity, including web exploitation, networking, system administration, and essential cyber defenses.
Web Penetration Testing : File Upload Vulnerability Dengan Metasploit.
🔍 Calculate fuzzy string similarity metrics in PHP, JavaScript, and Python with Fuzzion, a library featuring multiple distance algorithms for accurate comparisons.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."