doyensec / regexploitLinks
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆846Updated 2 years ago
Alternatives and similar repositories for regexploit
Users that are interested in regexploit are comparing it to the libraries listed below
Sorting:
- Finding potential software vulnerabilities from git commit messages☆419Updated 2 years ago
- ☆694Updated 3 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆775Updated last year
- ☆709Updated last year
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆452Updated last week
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,072Updated this week
- ☆561Updated 10 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆776Updated 3 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆388Updated last year
- Client Side Prototype Pollution Scanner☆524Updated 3 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆491Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆759Updated last year
- ☆1,180Updated 2 weeks ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆212Updated 2 years ago
- Simple DNS Rebinding Service☆722Updated 6 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆712Updated 2 years ago
- Fuzz test your application using your OpenAPI or Swagger API definition without coding☆465Updated 11 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Updated 4 years ago
- DOM XSS scanner for Single Page Applications☆417Updated 2 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated last month
- A DNS rebinding attack framework.☆1,254Updated 2 months ago
- Reverse proxies cheatsheet☆1,852Updated 2 years ago
- ☆1,202Updated 3 years ago
- An intentionally vulnerable NGINX setup☆245Updated 5 years ago
- A tool to test security of json web token☆286Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆945Updated 4 years ago
- A cheatsheet for exploiting server-side SVG processors.☆791Updated 5 years ago
- Content-Type Research☆655Updated 7 months ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,723Updated this week
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,281Updated 2 years ago