CORS Misconfiguration Scanner CORSy is a simple command-line tool that scans a website for CORS misconfigurations. It's a Python script that uses the `requests` library to send HTTP requests to the target website and checks for CORS-related headers. You can use it to identify potential security vulnerabilities in your website's CORS configuration. **How to use:** 1. Clone the repository: `git clone https://github.com/s0md3v/Corsy.git` 2. Install the dependencies: `pip install -r requirements.txt` 3. Run the script: `python corsy.py <target_url>` **Example:** `python corsy.py https://example.com` **Note:** This tool is for educational purposes only. Use it responsibly. **License:** MIT License
FEATURES
ALTERNATIVES
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
A network protocol panic button operating decentralized through UDP broadcasts and HTTP, intended for sensitive networks to prevent cold boot attacks.
Network Forensic Analysis Tool for deep network traffic inspection and analysis.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.
A KDE Plasma 4 widget that displays real-time traffic information for active network connections on Linux computers.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.