TheRook / CSP-Bypass
A Burp Plugin for Detecting Weaknesses in Content Security Policies
☆10Updated 9 years ago
Alternatives and similar repositories for CSP-Bypass:
Users that are interested in CSP-Bypass are comparing it to the libraries listed below
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- ☆12Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago