doyensec / regexploitLinks
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆811Updated last year
Alternatives and similar repositories for regexploit
Users that are interested in regexploit are comparing it to the libraries listed below
Sorting:
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆731Updated 10 months ago
- Finding potential software vulnerabilities from git commit messages☆416Updated last year
- ☆682Updated 3 years ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆945Updated this week
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆429Updated this week
- A collection of browser-based side channel attack vectors.☆751Updated last year
- ☆542Updated 3 months ago
- Client Side Prototype Pollution Scanner☆518Updated 2 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆692Updated last year
- ☆693Updated 7 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆738Updated 3 years ago
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆206Updated 2 years ago
- ☆1,002Updated last month
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆894Updated 6 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆383Updated 3 years ago
- Reverse proxies cheatsheet☆1,830Updated last year
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆369Updated 11 months ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆477Updated 2 years ago
- ☆1,346Updated 3 months ago