akrikos / CSRF-Testing-ToolsView external linksLinks
A pair of tools that make testing for CSRF vulnerabilities simple and repeatable.
☆16Oct 16, 2011Updated 14 years ago
Alternatives and similar repositories for CSRF-Testing-Tools
Users that are interested in CSRF-Testing-Tools are comparing it to the libraries listed below
Sorting:
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Nginx real-time monitoring☆12Nov 20, 2024Updated last year
- Veeam RESTful API demo for Cloud Connect☆10Jun 23, 2016Updated 9 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Python Wrappers for Post-Quantum Cryptography, see: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions☆10Jun 24, 2018Updated 7 years ago
- Golang bindings for libinjection☆11May 22, 2015Updated 10 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- tooling for collecting masscan data☆12Apr 5, 2023Updated 2 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 6 years ago
- superfeedr powered feedreader☆15Feb 18, 2022Updated 3 years ago
- Dependency Injection for Unity3D☆10Jul 24, 2016Updated 9 years ago
- Google Cloud Speech API Winform C# example☆13Apr 26, 2017Updated 8 years ago
- ☆15Jun 21, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- A node library to communicate with tor-control☆11Mar 28, 2018Updated 7 years ago
- symmetric encryption of email using a Diffie Hellman shared secret☆13Oct 22, 2013Updated 12 years ago
- Make IDs and fingerprints easier to verify, using the PGP Word List. Also exists in Rust https://github.com/thblt/pgp-words.rs/☆17Nov 3, 2021Updated 4 years ago
- Broadcast Copy☆262Sep 29, 2015Updated 10 years ago
- A programming language, highly based on modules and running separate programs for various functionality☆14Sep 2, 2019Updated 6 years ago
- C# bindings for the Metasploit RPC☆20Nov 7, 2016Updated 9 years ago
- Chef cookbook for windows server hardening☆15Dec 14, 2017Updated 8 years ago
- Run a docker container include hackazon, apache, and mysql☆16Oct 22, 2022Updated 3 years ago
- Beautiful plots in your terminal.☆32Jul 26, 2025Updated 6 months ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Python interface to libgfshare☆20Nov 9, 2023Updated 2 years ago
- Muses is a chrome extension that helps you memorise facts and notes.☆15Apr 8, 2016Updated 9 years ago
- HTBtui is a TUI (terminal user interface) client built with Textual for interacting with the Hack the Box api☆20May 7, 2024Updated last year
- 🔮 Automagically deploy i2pd with some common hidden services☆19Mar 23, 2018Updated 7 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆22Updated this week
- Actor for extracting data about hotels from Booking.com☆17Apr 21, 2023Updated 2 years ago
- C# SocksWebProxy, Communicate over Tor network.☆15Dec 28, 2017Updated 8 years ago
- A continuation of Torsten Mandelkow's wonderful, modern .NET charting library☆18Aug 6, 2014Updated 11 years ago
- a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode exec…☆23Feb 25, 2023Updated 2 years ago
- Historical perl code that ran the original NetAuthority.org site☆22Mar 15, 2017Updated 8 years ago
- ☆23Sep 7, 2024Updated last year
- A library that can be used to generate data for testing or other uses. You provide it with a pattern containing symbols defining the outp…☆67Dec 9, 2019Updated 6 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- A decentralized anonymous image board built on top of Bitmessage.☆27Mar 23, 2018Updated 7 years ago