You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is a simple password brute force tool designed for ethical hacking and security testing. Automates the process of selecting passwords for a given user on a website by sending POST requests with different passwords and analyzing the response.
WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!
Security research and vulnerability analysis from HackerOne bug bounty programs. Contains exploitation techniques, proof-of-concept code, and reports for fintech platforms and API gateways. Includes Python/Bash scripts, authentication bypasses, CORS exploits, IDOR vulnerabilities, and API security testing documentation.
A passwordless login system where a user enters their email, the site emails a short-lived redirect link (30 seconds) plus an 8-digit one-time code (OTP).
A Python tool for decrypting passwords hashed with the AuthMe SHA256 algorithm. Ideal for penetration testing and security audits on Minecraft servers using the AuthMe authentication plugin.
Intentionally vulnerable web application for security training. Modular design with SQLi, XSS, auth bypass, and file upload vulnerabilities. Docker containerized for safe, isolated learning environments. FOR EDUCATIONAL USE ONLY.
This repository details an IDOR vulnerability in AbsysNet 2.3.1, which allows a remote attacker to brute-force session IDs via the /cgi-bin/ocap/ endpoint. Successful exploitation can compromise active user sessions, exposing authentication tokens in HTML. The attack is limited to active sessions and is terminated if the user logs out.
A security PoC demonstrating how a public form with an embedded API key can bypass backend authentication, allowing attackers to access protected Express endpoints without credentials.