dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 8 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- ☆20Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Updated 7 years ago
- Open source exploit framework made in C#☆54Updated last year
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 10 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 10 months ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Updated 11 years ago
- Content Security Policy Creation tools☆35Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- ☆20Updated 2 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- ☆16Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 9 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Updated 3 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Updated 11 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Updated 10 years ago