OWASP / url-classifierLinks
Declarative syntax for defining sets of URLs. No need for error-prone regexs.
☆21Updated 6 years ago
Alternatives and similar repositories for url-classifier
Users that are interested in url-classifier are comparing it to the libraries listed below
Sorting:
- Serial Whitelist Application Trainer☆29Updated 6 years ago
- Automatically exported from code.google.com/p/javasnoop☆27Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- BSM based intrusion detection system☆39Updated 5 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Some useful scripts for penetration testing☆45Updated 8 years ago
- Man in the Middle SOCKS Proxy for JAVA☆36Updated 12 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Owasp Proxy☆31Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- A mysql honeypot, still very very early stage☆21Updated 12 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆53Updated 7 years ago
- Multithreaded SQL union bruteforcer☆16Updated 14 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Try various exploits to get root☆19Updated 11 years ago
- ☆78Updated 6 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- OWASP Passfault evaluates passwords and enforces password policy in a completely different way.☆176Updated 4 years ago
- Download exploits from exploit-db.com☆45Updated 10 years ago
- ☆28Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- ARP ping detector on local network☆15Updated 12 years ago