OWASP / OWASP-ProxyLinks
Owasp Proxy
☆30Updated 8 years ago
Alternatives and similar repositories for OWASP-Proxy
Users that are interested in OWASP-Proxy are comparing it to the libraries listed below
Sorting:
- ZAP Admin☆29Updated last week
- Repository for OWASP Code Review document☆16Updated 11 years ago
- ☆78Updated 5 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Ope…☆16Updated 10 years ago
- Simple Software Vulnerability Language (SSVL)☆13Updated 10 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- Not distributed anymore but allow the existing users of the plugin to use the latest version. Please migrate to:☆11Updated 9 months ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- OWASp PureCaptcha project☆26Updated 5 years ago
- Django Web UI contributed by Yandex for w3af.☆51Updated 10 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 10 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆44Updated 12 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆48Updated 9 years ago
- OWASP Top Ten☆48Updated 3 years ago
- GSM Sniffer☆36Updated 13 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 8 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 5 months ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Source code of IronWASP☆115Updated 11 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Penetration testing automation toolkit☆22Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. G…☆26Updated 12 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Updated 6 years ago