doyensec / regexploitLinks
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆837Updated last year
Alternatives and similar repositories for regexploit
Users that are interested in regexploit are comparing it to the libraries listed below
Sorting:
- Finding potential software vulnerabilities from git commit messages☆417Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆764Updated last year
- ☆685Updated 3 years ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,006Updated this week
- A collection of browser-based side channel attack vectors.☆756Updated last year
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆443Updated last week
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆377Updated last year
- ☆701Updated 11 months ago
- Client Side Prototype Pollution Scanner☆521Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆757Updated 3 years ago
- ☆554Updated 7 months ago
- ☆1,153Updated 3 weeks ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆399Updated 4 years ago
- An intentionally vulnerable NGINX setup☆242Updated 4 years ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Updated 2 years ago
- A DNS rebinding attack framework.☆1,194Updated last week
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆715Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆912Updated 3 years ago
- Simple DNS Rebinding Service☆701Updated 5 years ago
- DOM XSS scanner for Single Page Applications☆414Updated last week
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆487Updated 2 years ago
- Reverse proxies cheatsheet☆1,852Updated last year
- Content-Type Research☆639Updated 4 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆443Updated 2 months ago
- XS-Leaks Wiki☆169Updated 5 months ago
- A tool to test security of json web token☆279Updated 4 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆934Updated 9 months ago
- ☆1,192Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆774Updated 5 years ago
- Collections of Orange Tsai's public presentation slides.☆745Updated 10 months ago