TheRook / CSP-BypassLinks
A Burp Plugin for Detecting Weaknesses in Content Security Policies
☆10Updated 9 years ago
Alternatives and similar repositories for CSP-Bypass
Users that are interested in CSP-Bypass are comparing it to the libraries listed below
Sorting:
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 4 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Format string exploit generation☆10Updated 9 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 10 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago