-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …
-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …
-
@sleevi and @rmhrisk (I believe) both raised the point that when multi-party authentication is used, it should be able to be bypassed by an attacker compromising one authentication infrastructure (for…
-
Hello, and first of all a big **thank you** for developing Sparta. I love this tool, think the idea is spot-on and you have a great base here to make the ultimate 'semi-automated" pentesting tool, and…
-
Hey,
We are building arm templates for our logic apps and APIM apis( only apis, not the apim instance) and we get some positives that we wonder if they are correct and we are missing something or w…
-
Hello;
seems like a really handy script, but i wonder how to use it?
For example i have two workers as
worker1.domain.workers.dev
worker2.domain.workers.dev
so now where to put your script cod…
-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …
-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …
-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …
-
```
What steps will reproduce the problem?
1. run python ~/r-u-d-y.py http://www.xxx.yyy/zzz/form.aspx
2. select form
3. select attack parameter
4. select num. of connections to spawn
5. select proxy …