CORSy is a command-line scanner designed to identify CORS (Cross-Origin Resource Sharing) misconfigurations in web applications. The tool is implemented as a Python script that utilizes the requests library to send HTTP requests to target websites and analyze CORS-related headers for potential security vulnerabilities. The scanner operates by examining the response headers from web servers to detect improper CORS configurations that could expose applications to cross-origin attacks. It provides a straightforward approach to testing CORS implementations and identifying security gaps in web application configurations. CORSy requires Python and can be installed by cloning the repository and installing dependencies through pip. The tool accepts target URLs as command-line arguments and performs automated scanning to assess CORS security posture.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
A brute-force protection middleware for express routes that rate-limits incoming requests.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.