Tool to generate a valid Content Security Policy headers, integrity hashes and inline hashes for your current webpage
☆41Apr 20, 2016Updated 9 years ago
Alternatives and similar repositories for autocsp
Users that are interested in autocsp are comparing it to the libraries listed below
Sorting:
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- ☆30Jan 30, 2021Updated 5 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- The ArcGIS Pro SDK for utility network pre-releases.☆10Jan 25, 2019Updated 7 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- Secure access cloud terraform provider☆13Feb 24, 2026Updated last week
- ☆13Dec 17, 2025Updated 2 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Minimal typescript template to build an mcp server☆14May 4, 2025Updated 10 months ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆39Nov 6, 2016Updated 9 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- ☆10Jan 12, 2019Updated 7 years ago
- GovWifi Admin Platform☆11Feb 27, 2026Updated last week
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- A Swift Router Framework☆12Aug 18, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Specification 1 (hierarchical style) for an agentic software development crew, for implementation with mainstream Agentic platforms like…☆23Feb 11, 2026Updated 3 weeks ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- A machine-readable constitution for AI — Soul’s creativity hardened into ÆON☆15Sep 14, 2025Updated 5 months ago
- An API based on Itinero.☆13Dec 16, 2019Updated 6 years ago
- Swift Implementation of the Model Context Protocol (MCP) Spec☆10Mar 28, 2025Updated 11 months ago
- Scripts for managing a containerized version of Factorio☆10Feb 4, 2020Updated 6 years ago
- ☆10Aug 17, 2023Updated 2 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆13May 30, 2017Updated 8 years ago