YelSecurity / Yel-CSRF-tool
This is Chrome extension for detecting CSRF vulnerabilities.
☆10Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Yel-CSRF-tool
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Reflective/DOM XSS scanner built on casperJS☆81Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated last year
- A dashboard for interesting DOM tricks/techniques.☆36Updated 3 years ago
- Tool to recursively download versioned source code from .svn directories (pre Subversion-1.7 "WC-NG" format)☆8Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆19Updated 6 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆26Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- ☆11Updated 7 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- A mysql honeypot, still very very early stage☆21Updated 12 years ago
- XSS Weaponization☆34Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆73Updated 7 years ago
- ☆14Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆20Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆77Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- A better SSL cipher checker using gnutls☆27Updated 7 years ago
- IronBee Rules☆19Updated 10 years ago