gbleaney / python_securityLinks
This repository collects lists of security-relavent Python APIs, along with examples of exploits using those APIs
☆35Updated 4 years ago
Alternatives and similar repositories for python_security
Users that are interested in python_security are comparing it to the libraries listed below
Sorting:
- ☆95Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- ☆72Updated 4 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- Manual JavaScript Linting is a Bug☆48Updated 4 years ago
- ☆170Updated 4 years ago
- ☆73Updated 4 years ago
- ☆16Updated 4 years ago
- ☆75Updated last year
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 5 years ago
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 5 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- HTTP request smuggling tools☆18Updated 5 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago
- ☆44Updated 5 years ago
- ☆76Updated 5 years ago
- ☆87Updated last year
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 6 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year
- Find orphaned IP's on cloud services☆29Updated 6 years ago