doyensec / regexploit
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
☆797Updated 11 months ago
Alternatives and similar repositories for regexploit:
Users that are interested in regexploit are comparing it to the libraries listed below
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆707Updated 4 months ago
- Finding potential software vulnerabilities from git commit messages☆405Updated last year
- Semgrep rules registry☆830Updated this week
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,071Updated 11 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆905Updated 3 weeks ago
- CORS Misconfiguration Scanner☆1,389Updated 2 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆412Updated 2 months ago
- Private key usage verification☆418Updated last month
- ☆666Updated 2 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆540Updated 3 years ago
- A collection of browser-based side channel attack vectors.☆745Updated 9 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆676Updated 2 years ago
- DOM XSS scanner for Single Page Applications☆400Updated 6 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆848Updated last week
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,873Updated last year
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆463Updated last year
- ☆966Updated last week
- Client Side Prototype Pollution Scanner☆510Updated 2 years ago
- A security focused static analysis tool for Android and Java applications.☆1,109Updated this week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆831Updated 3 years ago
- Reverse proxies cheatsheet☆1,791Updated last year
- Fast HTTP enumerator☆464Updated last month
- ☆1,181Updated 2 years ago
- ☆1,284Updated this week
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆347Updated 5 months ago
- ☆527Updated last year
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆596Updated last year
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆368Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆420Updated last year