redstr 0.1.0

Red team string obfuscation and transformation for offensive security, WAF bypass, XSS, SQL injection, phishing, and evasion testing
Documentation
[[bin]]
name = "redstr"
path = "src/main.rs"
required-features = ["cli"]

[dependencies.serde]
features = ["derive"]
optional = true
version = "1.0"

[[example]]
name = "basic_usage"
path = "examples/basic_usage.rs"

[[example]]
name = "security_teams"
path = "examples/security_teams.rs"

[[example]]
name = "security_tool"
path = "examples/security_tool.rs"

[[example]]
name = "tool_integration"
path = "examples/tool_integration.rs"

[features]
cli = []
default = []
serde = ["dep:serde"]

[lib]
name = "redstr"
path = "src/lib.rs"

[package]
authors = ["Arvid Berndtsson <103070833+arvid-berndtsson@users.noreply.github.com>"]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = false
categories = ["development-tools", "text-processing", "web-programming", "encoding"]
description = "Red team string obfuscation and transformation for offensive security, WAF bypass, XSS, SQL injection, phishing, and evasion testing"
documentation = "https://docs.rs/redstr"
edition = "2021"
homepage = "https://github.com/arvid-berndtsson/redstr"
keywords = ["red-team", "security", "obfuscation", "waf-bypass", "evasion"]
license = "MIT"
name = "redstr"
readme = "README.md"
repository = "https://github.com/arvid-berndtsson/redstr"
version = "0.1.0"