tgianko / deemonLinks
Deemon is a tool to detect CSRF in web applications. Deemon has been used for the paper "Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs" by G. Pellegrino, M. Johns, S. Koch, M. Backes, and C. Rossow.
☆75Updated 7 years ago
Alternatives and similar repositories for deemon
Users that are interested in deemon are comparing it to the libraries listed below
Sorting:
- SecurityPaper For www.polaris-lab.com☆104Updated 6 years ago
- NagaScan is a distributed passive scanner for Web application.☆90Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆110Updated 8 years ago
- Struts2-045 Scanner☆75Updated 8 years ago
- A plug-in of sublime 2/3 which is able to find PHP vulnerabilities☆58Updated 7 years ago
- XSS hunter 收集Webview 页面上存在的反射,储存型XSS ,方便应急APP 和前端页面在发布时遇到XSS 安全问题..☆42Updated 9 years ago
- spring mvc cve-2014-3625☆32Updated 9 years ago
- Spring messaging STOMP protocol RCE☆113Updated 7 years ago
- Automated SonarQube☆70Updated 6 years ago
- Phantom eye——A passive business logic vulnerability auditing tool☆55Updated 6 years ago
- St2-052☆55Updated 8 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Updated 6 years ago
- A tool help get the basic information of one site☆108Updated 6 years ago
- XSS Fuzzer is a tool which generates XSS payloads based on user-defined vectors and fuzzing lists.☆140Updated 6 years ago
- acunetix☆62Updated 5 years ago
- Record some Vulnerabilities☆44Updated 3 years ago
- solana lets bonk fun copy sniper trading bot using grpc, and block engine, 0 slot☆108Updated 3 months ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Updated 8 years ago
- A python3 program to filter Burp Suite log file.☆77Updated 9 years ago
- 一个半自动化命令注入漏 洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆91Updated 8 years ago
- Multi-Thread Vulnerability Verify Framework☆55Updated 7 years ago
- Wafid identify and fingerprint Web Application Firewall (WAF) products.☆50Updated 7 years ago
- CVE 2017-9805☆60Updated 5 years ago
- 一个适配器模块,用于调用市面上流行的PoC框架(Beebeeto/PocSuite/TangScan/KsPoc)下的PoC.☆94Updated 8 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Updated 7 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 8 years ago
- Weblogic-CVE-2018-3191远程代码命令执行漏洞☆68Updated 7 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Updated 7 years ago
- ☆32Updated 9 years ago