doyensec / regexploitLinks
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆840Updated last year
Alternatives and similar repositories for regexploit
Users that are interested in regexploit are comparing it to the libraries listed below
Sorting:
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆770Updated last year
- Finding potential software vulnerabilities from git commit messages☆419Updated 2 years ago
- ☆691Updated 3 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆447Updated last month
- ☆702Updated last year
- Client Side Prototype Pollution Scanner☆522Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆765Updated 3 years ago
- ☆1,163Updated 2 months ago
- ☆557Updated 8 months ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆715Updated 2 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆400Updated 4 years ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆755Updated last year
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,036Updated this week
- Reverse proxies cheatsheet☆1,855Updated 2 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆953Updated 11 months ago
- Simple DNS Rebinding Service☆706Updated 5 years ago
- ☆1,188Updated 3 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,700Updated last week
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆490Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆935Updated 3 years ago
- A tool to test security of json web token☆278Updated 4 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,031Updated 4 years ago
- CORS Misconfiguration Scanner☆1,483Updated 3 years ago
- DOM XSS scanner for Single Page Applications☆415Updated 3 weeks ago
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆645Updated 3 months ago
- A DNS rebinding attack framework.☆1,230Updated last week
- Content-Type Research☆644Updated 5 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,059Updated 3 months ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆385Updated last year