an exploit of Server-side request forgery (SSRF)
-
Updated
Aug 2, 2024 - Python
an exploit of Server-side request forgery (SSRF)
A Complete SSRF (Server Side Request Forgery) Scanner.
Exploit Code, notes, and resources to accompany PortSwiggers' WebAcademy Labs.
Abusing data source creation mechanism to scan hosts in the network
Simple flask app to demonstrate Server-Side Request Forgery (SSRF) attack
A versatile SSRF vulnerability exploitation and testing framework
An automated tool for discovering vulnerabilities in GraphQL applications through fuzzing techniques, including OS Command Injection and XSS, with a focus on OWASP Top Ten vulnerabilities.
SSRF-Scanner Tool
SSRF stands for Server-Side Request Forgery. It's a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.
Add a description, image, and links to the ssrf-tool topic page so that developers can more easily learn about it.
To associate your repository with the ssrf-tool topic, visit your repo's landing page and select "manage topics."