jagracey / RegEx-DoSView external linksLinks
RegEx Denial of Service (ReDos) Scanner
☆181Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for RegEx-DoS
Users that are interested in RegEx-DoS are comparing it to the libraries listed below
Sorting:
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Check if an Array is sorted☆35Aug 11, 2021Updated 4 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- http://x0day.me/index.php/archives/multisearch-v2.html☆25Aug 25, 2014Updated 11 years ago
- Grunt plugin for retire.☆89Jul 20, 2023Updated 2 years ago
- 用于还原svn仓库,支持1.6,1.7☆26Jun 3, 2016Updated 9 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Simple text-to-speech in the browser for choo☆19Apr 12, 2018Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 2 years ago
- Download an array of objects as a CSV file in the browser☆13Nov 24, 2018Updated 7 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Specification of the Pug AST☆10Jul 21, 2016Updated 9 years ago
- Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.☆139Sep 16, 2023Updated 2 years ago
- python audit tool 审计 注入 inject☆182Feb 25, 2016Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆49Apr 8, 2022Updated 3 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆37Dec 18, 2022Updated 3 years ago
- AnyScan☆100Jul 1, 2020Updated 5 years ago
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- ☆13Oct 19, 2022Updated 3 years ago