anti-csrf-token-from-referer
Token replacer
Automatically replaces anti-CSRF tokens with values retrieved from the referer of an original request.
3 stars
10 watching
7 forks
Language: Python
last commit: over 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Deciphers CobaltStrike Beacon configurations from various formats. | 1,028 |
| An extension that bypasses anti-CSRF tokens in web applications | 18 |
| A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| An extension for Burp Suite that simplifies copying request and response data for report generation. | 27 |
| A script to detect and remove canary tokens from files. | 19 |
| An alternative implementation of Django's CSRF protection that does not use cookies. | 111 |
| A middleware library providing protection against malicious requests through the use of tokens. | 1,062 |
| An explanation of how CSRF attacks work and how to mitigate them in web applications. | 1,402 |
| An extension that automatically modifies certain HTTP requests to reveal potential CSRF vulnerabilities in web applications. | 160 |
| Tools to generate words lists and crack MD5 hashed security tokens from user data | 109 |
| Protects against Cross-Site Request Forgery (CSRF) attacks in web applications by verifying user input | 1,603 |
| Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
| Automates password cracking using hashcat | 1,675 |
| Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| Protects against cross-site request forgery attacks in web applications by adding authentication information to each request using sessions. | 41 |