OWASP / url-classifier
Declarative syntax for defining sets of URLs. No need for error-prone regexs.
☆20Updated 5 years ago
Alternatives and similar repositories for url-classifier:
Users that are interested in url-classifier are comparing it to the libraries listed below
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- ☆11Updated 7 years ago
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Automatically exported from code.google.com/p/javasnoop☆27Updated 9 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 12 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆21Updated 10 years ago
- Multithreaded SQL union bruteforcer☆16Updated 13 years ago
- Fizzer is an assessment tool for fuzzing FIX messages.☆27Updated 3 years ago
- Experimental Java agent to stomp on things.☆15Updated 5 years ago
- Open Source Network Security Platform☆40Updated 15 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- ☆78Updated 5 years ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆40Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆15Updated 6 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago