CSP-Bypass
CSP scanner
Detects vulnerabilities in Content Security Policies
A Burp Plugin for Detecting Weaknesses in Content Security Policies
163 stars
14 watching
38 forks
Language: Python
last commit: almost 2 years ago burp-plugincontent-security-policycspsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| Analyzes and configures website security policies to prevent malicious scripts from running on user devices. | 138 |
| A Burp extension that scans application traffic for signs of vulnerabilities and potential attack targets | 41 |
| Identifies web app endpoints and parameters to help detect vulnerabilities | 98 |
| An extension for Burp Suite that identifies potential security vulnerabilities in web applications by analyzing endpoints, parameters, and generating custom target wordlists. | 1,278 |
| Automated tool to discover and generate bypass payloads for Content Security Policy (CSP) restrictions on web pages | 678 |
| Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. | 44 |
| An account security scanner that detects vulnerabilities in online accounts by hashing credentials and checking against data breaches. | 157 |
| A tool that searches for vulnerabilities in web applications using an external API | 838 |
| Automates vulnerability assessment and endpoint discovery for web applications using Contrast Security's Teamserver API. | 16 |
| A modified Burp Suite extension that enhances vulnerability scanning capabilities by detecting and exploiting various injection vulnerabilities. | 31 |
| Automatically scans endpoints for potential SQL Truncation vulnerabilities by fuzzing request parameters | 62 |
| Automated vulnerability detection tool for web applications | 235 |
| A collection of Burp Suite rules for identifying and exploiting vulnerabilities in web applications | 340 |
| A plugin for Burp Suite that enables automated template generation and execution of security testing tools. | 1,202 |
| An extension for Burp Suite that provides a structured approach to identifying and testing common vulnerability parameters. | 2,192 |