gbleaney / python_securityLinks
This repository collects lists of security-relavent Python APIs, along with examples of exploits using those APIs
☆36Updated 4 years ago
Alternatives and similar repositories for python_security
Users that are interested in python_security are comparing it to the libraries listed below
Sorting:
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- ☆95Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- ☆72Updated 4 years ago
- ☆73Updated 4 years ago
- Manual JavaScript Linting is a Bug☆48Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Fetch the details of assets hosted on AWS.☆88Updated 2 years ago
- ☆76Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆68Updated 3 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago
- ☆90Updated 3 years ago
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- ☆170Updated 4 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 6 months ago
- ☆75Updated last year
- ☆16Updated 4 years ago
- Stay within program scope☆37Updated 3 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆44Updated 5 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Updated 4 years ago
- The commands and scripts I used in the Live Recon Village talks☆37Updated 4 years ago
- DNS and Target HTTP History Local Storage and Search☆63Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago