dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 7 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- ☆20Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Open source exploit framework made in C#☆54Updated 8 months ago
- ☆20Updated last year
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆10Updated 10 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 8 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆109Updated last year
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Projects and POCs☆60Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 8 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆33Updated 10 years ago