CORS Misconfiguration Scanner CORSy is a simple command-line tool that scans a website for CORS misconfigurations. It's a Python script that uses the `requests` library to send HTTP requests to the target website and checks for CORS-related headers. You can use it to identify potential security vulnerabilities in your website's CORS configuration. **How to use:** 1. Clone the repository: `git clone https://github.com/s0md3v/Corsy.git` 2. Install the dependencies: `pip install -r requirements.txt` 3. Run the script: `python corsy.py <target_url>` **Example:** `python corsy.py https://example.com` **Note:** This tool is for educational purposes only. Use it responsibly. **License:** MIT License
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.