0xcite / fingerpingLinks
A security tool to fingerprint PNG libraries used by web applications
☆82Updated 6 years ago
Alternatives and similar repositories for fingerping
Users that are interested in fingerping are comparing it to the libraries listed below
Sorting:
- A regex based source code scanner.☆127Updated 8 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 4 years ago
- Resources for developers and security engineers to learn the ropes of application security☆99Updated 7 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 7 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 6 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆109Updated last year
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Updated 7 years ago
- ☆182Updated 12 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Updated 8 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 10 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 7 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- TLS Redirection☆119Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 5 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166Updated 2 years ago