An application to catch, search and analyze HTTP secure headers.
☆64Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for headers
Users that are interested in headers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides from presentations I give!☆27Feb 27, 2026Updated last month
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- A security scanner for HTTP response headers.☆298Jan 19, 2025Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- GitHub Action that generates a Markdown summary of the issues in a repo☆12Jul 18, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- WebAppSec Confinement Origin Web Labels☆11Feb 16, 2021Updated 5 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- ☆27Jan 16, 2026Updated 2 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆188Aug 28, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All my slides for any talks☆23Oct 13, 2024Updated last year
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 10 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆44Jul 7, 2012Updated 13 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆143Mar 12, 2018Updated 8 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151May 29, 2020Updated 5 years ago