crlf-injector 
 CRLF Injector
 A tool designed to exploit vulnerabilities in web applications by injecting Carriage Return Line Feed (CRLF) characters into HTTP parameters or URLs.
A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
46 stars
 1 watching
 21 forks
 
Language: Python 
last commit: over 3 years ago   bugbountycrlf-injectionpythontoolshacking 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|    |  A tool to test for vulnerabilities in URL injection attacks involving CRLF characters | 10 | 
|    |  Tool to detect CRLF injection vulnerabilities in web applications | 160 | 
|    |  A powerful tool for detecting and exploiting CRLF injection vulnerabilities in web applications | 563 | 
|    |  Tools to scan CRLF vulnerability in web servers | 1,354 | 
|    |  A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 758 | 
|    |  A tool that hijacks TCP connections by injecting packets into existing connections to intercept data | 480 | 
|    |  A tool for injecting malware into processes by mapping it to memory without registering it with the kernel. | 147 | 
|    |  A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 | 
|    |  A Python wrapper for fully connected CRFs with Gaussian edge potentials used in computer vision and machine learning. | 1,962 | 
|    |  An extension that automatically modifies certain HTTP requests to reveal potential CSRF vulnerabilities in web applications. | 160 | 
|    |  Allows HTML manipulation and template rendering using CSS selectors familiar to web developers | 65 | 
|    |  A phishing framework that captures 2FA tokens and provides secure access to credentials | 1,335 | 
|    |  A tool designed to identify parameters in web applications that can be exploited for SSRF or out-of-band resource load attacks. | 291 | 
|    |  A lightweight implant tool allowing users to create and execute custom in-memory operations on Windows | 810 | 
|    |  A Burp Suite extension that inserts specific bytes into requests to bypass security checks for certain file types. | 21 |