OWASP / OWASP-Proxy
Owasp Proxy
☆30Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for OWASP-Proxy
- OWASP Top Ten☆48Updated 3 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- ZAP Admin☆27Updated this week
- OWASp PureCaptcha project☆26Updated 4 years ago
- Simple Software Vulnerability Language (SSVL)☆13Updated 9 years ago
- ☆77Updated 5 years ago
- A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Ope…☆16Updated 9 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 3 years ago
- Home of the developement for OWASP WTE - the Web Testing Environment, a collection of pre-packaged Linux AppSec tools, apps and documenta…☆82Updated last year
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆19Updated 6 months ago
- Not distributed anymore but allow the existing users of the plugin to use the latest version. Please migrate to:☆11Updated last month
- cross-platform sqlmap GUI aimed to mobile devices☆47Updated 8 years ago
- Source code of IronWASP☆113Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- XMLRPC server for password cracking☆32Updated 9 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆24Updated 6 years ago
- MSF database code, gemified☆52Updated 5 months ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. G…☆26Updated 12 years ago
- GSM Sniffer☆33Updated 13 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 13 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆45Updated 12 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- ☆36Updated 5 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 4 months ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆28Updated 9 years ago