dotnet-security-guard / fxcop-security-guardLinks
FxCop rules that aim to help security audit on .NET applications.
☆14Updated 7 years ago
Alternatives and similar repositories for fxcop-security-guard
Users that are interested in fxcop-security-guard are comparing it to the libraries listed below
Sorting:
- ☆20Updated 5 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- ☆20Updated last year
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- ☆11Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- Try harder to bypass that WAF...☆13Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆23Updated 7 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- ☆10Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Juniper backdoor☆13Updated 9 years ago