dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 8 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Open source exploit framework made in C#☆54Updated last year
- ☆20Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 7 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- ☆20Updated 2 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 8 years ago
- Projects and POCs☆61Updated 11 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- Puny Domain Name Check☆38Updated 6 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Exploits and research stuffs☆54Updated last week
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Updated 11 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Source Code Intelligence☆30Updated 8 years ago
- ☆51Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago