WhaleHOUDINI

.. /Ground control

Quick Usage

For this tool the run command is:

docker run -it --rm -p 80:80 -p 443:443 -p 8080:8080 -p 8443:8443 secsi/ground-control

Categories

misc

Description

This is a collection of most of my scripts that I use to debug Server Side Request Forgery (SSRF), blind XSS, and insecure XXE processing vulnerabilities.

  • DOCX/XLSX/PPTX
  • ODT/ODG/ODP/ODS
  • SVG
  • XML
  • PDF (experimental)
  • JPG (experimental)
  • GIF (experimental)

Cheatsheat

Use server!

curl -vv "http://localhost/redirect?url=http://169.254.169.254/latest/meta-data/"
curl -vv "http://localhost/ping_pong?body=%3ch1%3eHello%3c/h1%3e"

Official Documentation

Reference: https://github.com/jobertabma/ground-control

SecSI LogoHOUDINI

© 2025 — Made with ❤️ bySecSI