You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ Dusseldorf is a versatile out-of-band application security testing (OAST) tool.
4
4
5
5
It is aimed to empower security professionals to help automate the detection and exploitation of OOB (out of band) security vulnerabilities such as *Server Side Request Forgery* (SSRF), *Cross Site Scripting* (XSS), *Server Side Template Injection* (SSTI), *eXternal XML Entities* (XXE) and many other classes of security defects.
6
6
7
-
> This project is often stylized as *duSSeldoRF*, following a [common practice](https://en.wikipedia.org/wiki/List_of_Microsoft_codenames) to use place names. The beautiful Bavarian city Düsseldorf is one of the few places in the world with the letters *SSRF* in its name. For ease of use we substituted the umlaut character (alt-0252) ü for a normal u.
7
+
> This project is often stylized as *duSSeldoRF*, following a [common practice](https://en.wikipedia.org/wiki/List_of_Microsoft_codenames) to use place names. The beautiful city Düsseldorf is one of the few places in the world with the letters *SSRF* in its name. For ease of use we substituted the umlaut character (alt-0252) ü for a normal u.
8
8
9
9
Dusseldorf deploys DNS, HTTP, and HTTPS network listeners and listens on a domain name, such as `*.yourdomain.net`. All requests to this domain name, and any subdomain in it (called _zones_, such as `foo.yourdomain.net` and `foo.bar.yourdomain.net`) are captured by these network listeners.
0 commit comments