21 skills found
dwisiswant0 / CrlfuzzA fast tool to scan CRLF vulnerability written in Go
r0075h3ll / OralyzerOpen Redirection Analyzer
Raghavd3v / CRLFsuiteThe most powerful CRLF injection (HTTP Response Splitting) scanner.
cujanovic / CRLF Injection PayloadsPayloads for CRLF Injection
MichaelStott / CRLF Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
dubs3c / InjectusCRLF and open redirect fuzzer
rudSarkar / Crlf InjectorA CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
A0WaQ4 / BurpCRLFScan使用java编写的CRLF-Injection-burp被动扫描插件
karthi-the-hacker / CrlfiCRLF Bug scanner for WebPentesters and Bugbounty Hunters
AliDbg / Htaccess FirewallWebsite security protection against hacking attempts: XSS|RFI|CRLF|CSRF|Base64|Code Injection|SQL Injection|Anti Code Exploit
Proviesec / Crlf PayloadsNo description available
Moopinger / Crlf Detection ScriptCRLF Detection based on @BlackFan 's work See link below
qwqoro / Mail Injection📧 [Research] E-Mail Injection: Vulnerable applications
nmochea / CRLF InjectionA powerful tool to scan CRLF vulnerability written in Python
ualvesdias / CrlfbruterA simple tool to test for CRLF injection
ferreiraklet / FrizzCrlf Injection Finder
darrenpmeyer / Logging Formatter AnticrlfPython logging Formatter for CRLF Injection (CWE-93 / CWE-117) prevention
raikar / Attack DocsThis repo contains comprehensive lists of attack payloads known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, http header crlf injections, and more
Cappricio-Securities / CrlfiThis is a tool used by several security researchers to find Carriage Return Line Feed Injection Bug
GlitchHunter1 / HTB CyberAttack Web Writeup🕵️♂️ HTB Web Challenge Write-up — Cyber Attack A deep dive into one of the most complex HTB web challenges involving chained SSRF, blind command injection, CRLF header injection, and proxy bypass. This write-up walks through the full exploitation path from source code analysis to crafting a reverse shell payload, step by step.