olivo / redos-detectorView external linksLinks
A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.
☆36Jun 24, 2016Updated 9 years ago
Alternatives and similar repositories for redos-detector
Users that are interested in redos-detector are comparing it to the libraries listed below
Sorting:
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Just a logging.☆11Dec 6, 2025Updated 2 months ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Dec 24, 2018Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- OCaml bot for arbitraging Bitcoin exchanges☆51Jul 12, 2019Updated 6 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 6 years ago
- LLVM-based, flexible, live coverage instrumentation for C/C++ code☆46Jan 27, 2016Updated 10 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Metasploit Framework☆26Updated this week
- Various tools related to SSL denial of service☆47Sep 23, 2014Updated 11 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- ☆25Oct 6, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- A collection of exploits for different VoIP products.☆262Feb 2, 2026Updated last week
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A REPL for the Android Debug Bridge (ADB)☆126Nov 30, 2014Updated 11 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Program Analysis for LLVM☆38Mar 25, 2017Updated 8 years ago
- ☆12Jan 29, 2026Updated 2 weeks ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆70Apr 20, 2016Updated 9 years ago
- Example of using Protractor with Cucumber and Page Objects☆10Apr 12, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Mar 28, 2019Updated 6 years ago