httpoxy / python-httpoxy-pocLinks
☆11Updated 9 years ago
Alternatives and similar repositories for python-httpoxy-poc
Users that are interested in python-httpoxy-poc are comparing it to the libraries listed below
Sorting:
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆43Updated 11 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- ☆86Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆134Updated 11 years ago
- ☆20Updated last year
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Updated 11 years ago
- ☆90Updated 4 years ago
- Heartbleed (CVE-2014-0160) client exploit☆323Updated 9 years ago
- ☆46Updated 9 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆26Updated 9 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- Ruby interface to cirt.net default passwords database☆19Updated 14 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- ☆133Updated 9 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Updated 8 years ago
- ☆14Updated 7 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- Duncan - Blind SQL injector skeleton☆58Updated 3 years ago
- ☆83Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago