hackerone-reports
Egyscan
hackerone-reports | Egyscan | |
---|---|---|
2 | 1 | |
3,195 | 179 | |
- | - | |
6.3 | 8.6 | |
12 days ago | 4 months ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hackerone-reports
- GitHub - reddelexc/hackerone-reports: Top disclosed reports from HackerOne
-
XXE (XML External Entity) Attack & Prevention
There was an interesting case on Hackerone where the XMP metadata of a JPG file was getting parsed unsafely. There are many other interesting XXE bugs there as well if you want to take a look.
Egyscan
What are some alternatives?
reconftw - reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
phpvuln - 🕸️ Audit tool to find common vulnerabilities in PHP source code
hackthebox - Notes Taken for HTB Machines & InfoSec Community.
Vailyn - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Exif-Maniac - Post Exploitation Framework via Exif Data in images
waf-bypass - Check your WAF before an attacker does
SpringShell - Spring4Shell - Spring Core RCE - CVE-2022-22965
CVE-2021-40444 - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
OWASP-Xenotix-XSS-Exploit-Framework - OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.
EJS-Exploit - Remote Code Execution EJS Web Applications using express-fileupload
PoC-CVE-2022-30190 - POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina