Kennysan / CSPToolsLinks
Content Security Policy Creation tools
☆35Updated 9 years ago
Alternatives and similar repositories for CSPTools
Users that are interested in CSPTools are comparing it to the libraries listed below
Sorting:
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- ☆20Updated 5 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Updated 7 years ago
- ☆198Updated 9 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Updated 8 years ago
- Content Security Policy rule collector extension for Fiddler☆92Updated 9 years ago
- jPurify☆64Updated 8 years ago
- Repository for OWASP Code Review document☆16Updated 11 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Faraday Continuous Scanning☆34Updated 8 years ago
- Tainted PhantomJS☆52Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆40Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws☆41Updated 7 years ago
- Web Sight Back-end Community Edition☆43Updated 2 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆19Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago