doyensec / regexploitLinks
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆839Updated last year
Alternatives and similar repositories for regexploit
Users that are interested in regexploit are comparing it to the libraries listed below
Sorting:
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆769Updated last year
- Finding potential software vulnerabilities from git commit messages☆417Updated 2 years ago
- ☆688Updated 3 years ago
- ☆555Updated 7 months ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆444Updated 3 weeks ago
- ☆1,159Updated last month
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,019Updated this week
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆763Updated 3 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆951Updated 10 months ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆487Updated 2 years ago
- ☆702Updated 11 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆399Updated 4 years ago
- A collection of browser-based side channel attack vectors.☆757Updated last year
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆717Updated 2 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,698Updated 2 weeks ago
- Client Side Prototype Pollution Scanner☆522Updated 3 years ago
- An intentionally vulnerable NGINX setup☆243Updated 5 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆382Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆447Updated 3 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆926Updated 3 years ago
- Content-Type Research☆644Updated 4 months ago
- ☆1,193Updated 3 years ago
- DOM XSS scanner for Single Page Applications☆415Updated last week
- CORS Misconfiguration Scanner☆1,476Updated 3 years ago
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆748Updated 4 years ago
- Fuzz test your application using your OpenAPI or Swagger API definition without coding☆459Updated 8 months ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Updated 2 years ago
- Simple DNS Rebinding Service☆705Updated 5 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆899Updated 3 years ago
- Reverse proxies cheatsheet☆1,855Updated 2 years ago