dotnet-security-guard / fxcop-security-guard
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 6 years ago
Related projects: ⓘ
- ☆20Updated 5 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆65Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆30Updated 8 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆23Updated 6 years ago
- ☆14Updated this week
- Tool for inspecting Windows Phone applications☆28Updated 11 years ago
- ☆28Updated this week
- ☆20Updated this week
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆13Updated last year
- Reverse Engineering and Exploit Development stuff☆30Updated 6 years ago
- C# bindings for the Metasploit RPC☆21Updated 7 years ago
- Proof-of-Concept scripts for various issues.☆14Updated 7 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆26Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆49Updated 8 years ago
- A tool for calculating necessary SQL Server permissions☆23Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆33Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- ☆42Updated this week
- Burp Extender to add unique form tokens to scanner requests.☆13Updated 8 years ago
- A tool for configuring and using MITM proxies from firefox☆47Updated 7 years ago
- Projects and POCs☆58Updated 10 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- ☆11Updated this week
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago