The Wayback Machine - https://web.archive.org/web/20210801190702/https://github.com/topics/ssti
Here are
15 public repositories
matching this topic...
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Updated
Jul 30, 2021
Shell
Simple websites vulnerable to Server Side Template Injections(SSTI)
🎯 Server Side Template Injection Payloads
CVE-2019-3396 confluence SSTI RCE
Updated
Oct 1, 2020
Python
Updated
Aug 13, 2020
HTML
CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection
Updated
Jun 5, 2019
Python
A Tool Written In Python3 To Send Blind Payloads On The Request Headers Maybe Stored On The Logs.
Updated
Jan 13, 2021
Python
Templated WEB Challenge of the webside Hack The Box (HTB) Walkthough Capture The Flag (CTF)
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
Updated
Dec 11, 2020
Shell
Baby Ninja Jinja WEB Challenge of the webside Hack The Box (HTB) Walkthough Capture The Flag (CTF)
Updated
Apr 25, 2021
Python
The CTF requires an understanding of how Flask works in order to exploit an SSTI.
[BEW 2.3: Web Security] Clone this repo to begin the SSTI exploit activity.
A simple automation tool to detect LFI, RCE and SSTI vulnerability. Forked for PR and customization
Updated
Feb 25, 2021
Python
Vulnerability Walkthrough
Updated
Jul 16, 2021
HTML
Improve this page
Add a description, image, and links to the
ssti
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
ssti
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.