Kennysan / CSPTools
Content Security Policy Creation tools
☆35Updated 9 years ago
Alternatives and similar repositories for CSPTools
Users that are interested in CSPTools are comparing it to the libraries listed below
Sorting:
- ☆74Updated 12 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Updated 7 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Reflective/DOM XSS scanner built on casperJS☆81Updated 10 years ago
- ☆20Updated 5 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Tagging and annotation framework for scan data☆101Updated 6 years ago
- Tainted PhantomJS☆52Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆31Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- ng-owasp: OWASP Top 10 for AngularJS Applications☆49Updated 9 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- jPurify☆65Updated 8 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- ☆32Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆198Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆38Updated 10 years ago
- Image size issues plugin for Burp Suite☆94Updated 6 years ago
- Content Security Policy rule collector extension for Fiddler☆92Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆19Updated 9 years ago
- Updated version of SWFIntruder☆26Updated 8 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- A security tool to fingerprint PNG libraries used by web applications☆80Updated 6 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago