doyensec / regexploit
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆800Updated last year
Alternatives and similar repositories for regexploit:
Users that are interested in regexploit are comparing it to the libraries listed below
- ☆672Updated 2 years ago
- ☆1,298Updated 2 weeks ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,085Updated last year
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆709Updated 6 months ago
- Finding potential software vulnerabilities from git commit messages☆408Updated last year
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆703Updated 2 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆416Updated 3 months ago
- ☆972Updated last month
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,896Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆852Updated last month
- CORS Misconfiguration Scanner☆1,391Updated 2 years ago
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,377Updated this week
- Reverse proxies cheatsheet☆1,799Updated last year
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,588Updated 7 months ago
- Semgrep rules registry☆857Updated this week
- ☆1,182Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆467Updated last year
- Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a …☆1,380Updated this week
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆371Updated 3 years ago
- Private key usage verification☆424Updated 2 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,439Updated 11 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆846Updated 3 years ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆201Updated last year
- ☆533Updated last year
- Content-Type Research☆599Updated last year
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆687Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆713Updated 4 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆517Updated 7 months ago
- Making Favicon.ico based Recon Great again !☆1,155Updated last year
- 🎯 Fast CORS misconfiguration vulnerabilities scanner☆1,061Updated 3 years ago