An application to catch, search and analyze HTTP secure headers.
☆64Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for headers
Users that are interested in headers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides from presentations I give!☆27Feb 27, 2026Updated 2 months ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆16Jan 25, 2026Updated 3 months ago
- A security scanner for HTTP response headers.☆297Jan 19, 2025Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆19Aug 13, 2015Updated 10 years ago
- Venom tests suite to validate an HTTP security response headers configuration against OSHP recommendation.☆136Jan 25, 2026Updated 3 months ago
- Check any website (or set of websites) for insecure security headers.☆256Jun 12, 2023Updated 2 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- fuzzydb is a fuzzy matching database engine capable of providing human-like search results that make life much easier for users of websit…☆20Apr 17, 2023Updated 3 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- OWASP Foundation Web Respository☆12Apr 21, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated 2 months ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Advanced API Security (2nd Edition) Book Samples☆11Nov 12, 2020Updated 5 years ago
- Continuous Security on AWS Workshop (CSOA) published by Pearson☆11Aug 14, 2022Updated 3 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 7 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- JavaScript charting library☆10Jul 18, 2023Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆188Aug 28, 2025Updated 8 months ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11May 30, 2021Updated 4 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago