TheRook / CSP-Bypass
A Burp Plugin for Detecting Weaknesses in Content Security Policies
☆10Updated 9 years ago
Alternatives and similar repositories for CSP-Bypass:
Users that are interested in CSP-Bypass are comparing it to the libraries listed below
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- ☆10Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- PDF report generator for basic recon☆9Updated 7 years ago
- Operational toolset utilizing git's submodule feature☆56Updated 12 years ago
- python tools to assist in penetration testing☆14Updated last month
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 9 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- PHP tool to test XSS☆22Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago