An application to catch, search and analyze HTTP secure headers.
☆64Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for headers
Users that are interested in headers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- A security scanner for HTTP response headers.☆298Jan 19, 2025Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆132Updated this week
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- A template repository to make yumemi-daigirin books☆12Updated this week
- Metasploit's native payload for Mac OS X and iOS☆21Jun 30, 2014Updated 11 years ago
- Vulnerability Dashboard☆31Feb 4, 2019Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- ☆27Jan 16, 2026Updated 2 months ago
- 渗透测试中的python应用☆21Jul 25, 2016Updated 9 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆187Aug 28, 2025Updated 6 months ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Nov 8, 2022Updated 3 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,927Mar 16, 2026Updated last week
- A guide explaining how to use Gophish☆42Sep 6, 2022Updated 3 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- SpamAssassin plugin for detecting VBA macros in Microsoft Office Documents☆11Mar 3, 2016Updated 10 years ago