OWASP / OWASP-Proxy
Owasp Proxy
☆30Updated 8 years ago
Alternatives and similar repositories for OWASP-Proxy:
Users that are interested in OWASP-Proxy are comparing it to the libraries listed below
- ZAP Admin☆29Updated this week
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- GSM Sniffer☆34Updated 13 years ago
- OWASp PureCaptcha project☆26Updated 5 years ago
- Minion Frontend☆30Updated 5 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆21Updated 7 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- OWASP Top Ten☆48Updated 3 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 8 months ago
- Simple Software Vulnerability Language (SSVL)☆13Updated 10 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Repo for the OWASP Quick Start Guide☆10Updated 10 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 5 years ago
- git for the owasp books project; setting up processes capabilities for publishing OWASP books☆18Updated 6 years ago
- Django Web UI contributed by Yandex for w3af.☆51Updated 9 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 7 years ago
- Source code of IronWASP☆116Updated 11 years ago
- ☆78Updated 5 years ago
- ☆36Updated 5 years ago
- Simplified Identity and Access☆40Updated 2 weeks ago
- ☆198Updated 9 years ago
- MSF database code, gemified☆52Updated this week
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated last month
- A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Ope…☆16Updated 9 years ago
- DefectDojo Documentation☆16Updated 3 years ago
- Various Kali Scripts☆55Updated 8 years ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 8 years ago