dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 7 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- ☆20Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆33Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Open source exploit framework made in C#☆54Updated 7 months ago
- ☆20Updated last year
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 7 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- ☆16Updated 9 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Source Code Intelligence☆30Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- ☆10Updated 10 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- NTPD remote DOS exploit and vulnerable container☆24Updated 7 years ago