moloch-- / CSP-Bypass
A Burp Plugin for Detecting Weaknesses in Content Security Policies
☆163Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CSP-Bypass
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆156Updated 5 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆189Updated 8 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆135Updated 3 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆136Updated 4 years ago
- Improved decoder for Burp Suite☆135Updated 3 years ago
- An example of obtaining RCE via Redis and CSRF☆77Updated 8 years ago
- A regex based source code scanner.☆128Updated 7 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆253Updated 5 months ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 8 years ago
- ☆227Updated 9 years ago
- Local File Inclusion Exploitation Tool (mirror)☆122Updated 7 years ago
- An automated XSS payload generator written in python.☆316Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Image size issues plugin for Burp Suite☆93Updated 6 years ago
- ☆159Updated 6 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆191Updated 9 years ago
- Web Application Security☆124Updated 5 months ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆190Updated 7 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 2 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆68Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 6 years ago