98 skills found · Page 1 of 4
nemesida-waf / Waf BypassCheck your WAF before an attacker does
vladko312 / SSTImapAutomatic SSTI detection tool with interactive interface
1ndianl33t / Gf PatternsGF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
Marven11 / Fenjing专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF
Adamkadaban / CTFsCTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
R0X4R / GarudAn automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
Lotus6 / JavaGadgetGeneratorJavaGadgetGenerator 工具,支持 ysoserial,Hessian,字节码,Expr/SSTI,Shiro,JDBC 等 Gadget 生成,封装,混淆,出网延迟探测,内存马注入等...
DiogoMRSilva / WebsitesVulnerableToSSTISimple websites vulnerable to Server Side Template Injections(SSTI)
pikpikcu / XRCrossXRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Yt1g3r / CVE 2019 3396 EXPCVE-2019-3396 confluence SSTI RCE
unix-ninja / ShellfireAn exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.
X3NNY / SstilabsA lab to help you learning SSTI
TrixSec / WaymapWaymap is a fast and optimized web vulnerability scanner built for penetration testers. It helps in identifying vulnerabilities by testing against various payloads.
B0T1eR / YsoSimpleysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,JdbcAttackPayload,JNDIAttack,字节码生成。
p3n73st3r / GhaziGhazi is a BurpSuite Plugins For Testing various PayLoads Like "XSS,SQLi,SSTI,SSRF,RCE and LFI" through Different tabs , Where Each Tab Will Replace Every GET or POST Parameters With Selected TAB in "Proxy" or "Repeater" TAB
vladko312 / Research Successful ErrorsClear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
VikasVarshney / Ssti PayloadSSTI Payload Generator
TROUBLE-1 / White Box PentestingThis lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities
p1n93r / SpringBootAdmin Thymeleaf SSTISpringBootAdmin-thymeleaf-SSTI which can cause RCE
Err0r-ICA / SCANterWebsites Vulnerability Scanner