dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 7 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆23Updated 7 years ago
- ☆20Updated 6 years ago
- Open source exploit framework made in C#☆54Updated 6 months ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- ☆20Updated last year
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆33Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Content Security Policy Creation tools☆35Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 4 months ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Projects and POCs☆60Updated 11 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆109Updated last year
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Juniper backdoor☆14Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago