Top 15 Any Origin Alternative and Similar Softwares | May 2024

Any Origin.
Same-Origin-Policy? Not on my watch.

Cross domain jsonp access.

1. Whatever Origin

Whatever Origin Whatever Origin is an open source alternative to AnyOrigin.comWhen I was facing Same Origin problems while developing Bitcoin Pie, I was excited to discover how anyorigin.com solved the issue for me ... only, a week later it stopped working for some https sites.......

2. CORS Proxy

CORS Proxy über-simple node.js-Proxy to enable CORS request for any website.......

3. corsproxy

corsproxy CORS is a technology specification to get around the Same Origin Policy restrictions of web browsers. To allow cross domain sharing, web servers have to attach additional headers. Unfortunately, not many servers have done this yet, and hence we have issues trying to access their resources in certain scenarios such......

4. CORS & SSL Proxy

CORS & SSL Proxy It’s a fast, reliable proxy that you can use to connect to APIs, which don’t support CORS or HTTPS or both.......

5. CORS Anywhere

CORS Anywhere CORS Anywhere is a NodeJS proxy which adds CORS headers to the proxied request.......

6. Negotiator

Negotiator Surf the web on your termsCustom cleaning/blocking of the HTTP requests combining blocking features from RequestPolicy and referer changes from RefControl and lots more.You must define what to block yourself:Define filters in pairs of referer-target(optional wildcard) and assign an action.Actions can be block or one of your custom header operations.......

7. sploit.io

sploit.io We host only the best cyber security tools for you to use at your disposal; we simplify the scripts to make it quicker and easier to use. Simply point our service towards your website or network and see the information roll in.......

8. edgescan

edgescan edgescan is a cloud-based continuous vulnerability management and penetration testing solution. It is a highly accurate SaaS (Security-as-a-Service) solution which helps clients to discover, and manage application and network vulnerabilities (full-stack information security) on an ongoing basis. All vulnerabilities are verified by our security analysts which results in accurate, "false-positive......

9. Zed Attack Proxy

Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.ZAP......

10. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

11. RequestPolicy

RequestPolicy RequestPolicy is an extension for Mozilla browsers that improves the privacy and security of your browsing by giving you control over when cross-site requests are allowed by webpages you visit. It is the first comprehensive client-side protection against CSRF attacks and the first tool to enable the use of modern......

12. Arachni

Arachni Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.......

13. SecApps

SecApps Find security vulnerabilities right from your browser. Experience the next generation security tools without the need to install any additional software......

14. NotScripts

NotScripts NotScripts gives you a high degree of "NoScript" like control over what javascript, iframes, and plugins runs in your browser to increase security and lower the CPU usage. It is useful to help mitigate some attacks like certain cross-site scripting (XSS) vulnerabilities and drive by downloads by blocking the third-party......

15. Ammonite

Ammonite Ammonite is a web application security scanner extension for Fiddler. Ammonite detects common vulnerabilities such as SQL injection, OS command injection, cross-site scripting, file inclusion, format string vulnerabilities, and buffer overflows. Ammonite includes unique features that make it particularly well suited for penetration testers and security professionals.......