httpoxy / httpoxy-orgLinks
The disclosure website for httpoxy
☆10Updated 3 years ago
Alternatives and similar repositories for httpoxy-org
Users that are interested in httpoxy-org are comparing it to the libraries listed below
Sorting:
- Git module to prevent from committing sensitive information into the repository.☆51Updated 8 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆142Updated last year
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Updated 5 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 9 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- A regex based source code scanner.☆127Updated 8 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆146Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- ☆90Updated 8 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆145Updated 3 weeks ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- Automatically exported from code.google.com/p/mustache-security☆23Updated 10 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- Mass scanner for the Java serialize bug☆152Updated 7 months ago
- a grep -r for secrets☆179Updated 3 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 7 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- ☆25Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 months ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 4 years ago
- ☆90Updated 5 months ago
- Tool for introspection of SSL\TLS sessions☆142Updated last week
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago