JordanMilne / AdvocateLinks
An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like to continue work on it.
☆95Updated last year
Alternatives and similar repositories for Advocate
Users that are interested in Advocate are comparing it to the libraries listed below
Sorting:
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated last year
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- ☆32Updated 9 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆139Updated 11 months ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Jaqen - Simple DNS rebinding☆72Updated 7 years ago
- A security tool to fingerprint PNG libraries used by web applications☆81Updated 6 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- Mass zone transfer python script☆16Updated 9 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- A library for classifying strings as potential secrets.☆64Updated 3 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- A tool to surface security issues in python code☆227Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago
- Scan for vulnerabilities in JavaScript libraries you use (Python port of retirejs)☆51Updated 5 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- ☆93Updated 2 years ago