Command line tool for testing CRLF injection on a list of domains. This tool allows you to test for CRLF injection vulnerabilities on a list of domains. Usage: python crlf_injection_scanner.py [options] [domains] Options: -h, --help Show this help message and exit. -v, --version Show the version number and exit. -d, --domains Specify the list of domains to scan. -o, --output Specify the output file. -c, --config Specify the configuration file. Example: python crlf_injection_scanner.py -d example.com -o output.txt
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Code to prevent a managed .NET debugger/profiler from working.
A sandbox for quickly sandboxing known or unknown families of Android Malware
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.