A pair of tools that make testing for CSRF vulnerabilities simple and repeatable.
☆17Oct 16, 2011Updated 14 years ago
Alternatives and similar repositories for CSRF-Testing-Tools
Users that are interested in CSRF-Testing-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang bindings for libinjection☆11May 22, 2015Updated 10 years ago
- superfeedr powered feedreader☆15Feb 18, 2022Updated 4 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- A programming language, highly based on modules and running separate programs for various functionality☆14Sep 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dependency Injection for Unity3D☆10Jul 24, 2016Updated 9 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Nginx real-time monitoring☆12Nov 20, 2024Updated last year
- Muses is a chrome extension that helps you memorise facts and notes.☆15Apr 8, 2016Updated 10 years ago
- tooling for collecting masscan data☆12Apr 5, 2023Updated 3 years ago
- Run a docker container include hackazon, apache, and mysql☆16Oct 22, 2022Updated 3 years ago
- ☆75Sep 25, 2025Updated 6 months ago
- HTBtui is a TUI (terminal user interface) client built with Textual for interacting with the Hack the Box api☆19May 7, 2024Updated last year
- Python Wrappers for Post-Quantum Cryptography, see: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions☆10Jun 24, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Actor for extracting data about hotels from Booking.com☆17Apr 21, 2023Updated 2 years ago
- A library that can be used to generate data for testing or other uses. You provide it with a pattern containing symbols defining the outp…☆67Dec 9, 2019Updated 6 years ago
- A continuation of Torsten Mandelkow's wonderful, modern .NET charting library☆18Aug 6, 2014Updated 11 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- A node library to communicate with tor-control☆11Mar 28, 2018Updated 8 years ago
- Broadcast Copy☆262Sep 29, 2015Updated 10 years ago
- Python interface to libgfshare☆20Nov 9, 2023Updated 2 years ago
- symmetric encryption of email using a Diffie Hellman shared secret☆12Oct 22, 2013Updated 12 years ago
- Beautiful plots in your terminal.☆32Jul 26, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Make IDs and fingerprints easier to verify, using the PGP Word List. Also exists in Rust https://github.com/thblt/pgp-words.rs/☆17Nov 3, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Veeam RESTful API demo for Cloud Connect☆10Jun 23, 2016Updated 9 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Chef cookbook for windows server hardening☆15Dec 14, 2017Updated 8 years ago
- C# bindings for the Metasploit RPC☆20Nov 7, 2016Updated 9 years ago
- ☆46Aug 13, 2022Updated 3 years ago
- 🔮 Automagically deploy i2pd with some common hidden services☆18Mar 23, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An iterative doodling adventure!☆35May 23, 2017Updated 8 years ago
- Tharga Toolkit Console is used to simplify construction of advanced console applications.☆23Updated this week
- ☆16Jun 21, 2021Updated 4 years ago
- Historical perl code that ran the original NetAuthority.org site☆22Mar 15, 2017Updated 9 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Google Cloud Speech API Winform C# example☆13Apr 26, 2017Updated 8 years ago
- Python client API for Netbox☆32May 28, 2021Updated 4 years ago