Find regular expressions vulnerable to ReDoS

Edit Package regexploit
https://github.com/doyensec/regexploit

Many default regular expression parsers have unbounded worst-case complexity.
Regex matching may be quick when presented with a matching input string.
However, certain non-matching input strings can make the regular expression
matcher go into crazy backtracking loops and take ages to process. This can
cause denial of service, as the CPU will be stuck trying to match the regex.

This tool is designed to:
* find regular expressions which are vulnerable to ReDoS
* give an example malicious string which will cause catastrophic backtracking

Supports:
- C#
- JavaScript/TypeScript (requires node to be installed)
- JSON
- Python
- YAML

Refresh
Refresh
Source Files (show unmerged sources)
Filename Size Changed
regexploit-1.0.0.tar.gz 0000072704 71 KB
regexploit.changes 0000000182 182 Bytes
regexploit.spec 0000002250 2.2 KB
Source MD5 is 63c4a0a76d857b13a3ffb2b58fa122fc (latest revision is 5)
Comments 0
openSUSE Build Service is sponsored by