[[bench]]
harness = false
name = "transformations"
path = "benches/transformations.rs"
[[bin]]
name = "redstr"
path = "src/main.rs"
required-features = ["cli"]
[dependencies.serde]
features = ["derive"]
optional = true
version = "1.0"
[dev-dependencies.cc-check]
version = "0.1"
[dev-dependencies.criterion]
version = "0.8"
[[example]]
name = "basic_usage"
path = "examples/basic_usage.rs"
[[example]]
name = "cloudflare_evasion"
path = "examples/cloudflare_evasion.rs"
[[example]]
name = "graphql_injection"
path = "examples/graphql_injection.rs"
[[example]]
name = "jwt_manipulation"
path = "examples/jwt_manipulation.rs"
[[example]]
name = "nosql_injection"
path = "examples/nosql_injection.rs"
[[example]]
name = "security_teams"
path = "examples/security_teams.rs"
[[example]]
name = "security_tool"
path = "examples/security_tool.rs"
[[example]]
name = "ssti_injection"
path = "examples/ssti_injection.rs"
[[example]]
name = "tool_integration"
path = "examples/tool_integration.rs"
[features]
cli = []
default = []
serde = ["dep:serde"]
[lib]
crate-type = ["rlib"]
name = "redstr"
path = "src/lib.rs"
[package]
authors = ["Arvid Berndtsson <dev@arvid.tech>"]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = false
categories = ["development-tools", "text-processing", "web-programming", "encoding"]
description = "Red team string obfuscation and transformation for offensive security, WAF bypass, XSS, SQL injection, phishing, and evasion testing"
documentation = "https://docs.rs/redstr"
edition = "2021"
homepage = "https://github.com/arvid-berndtsson/redstr"
keywords = ["red-team", "security", "obfuscation", "waf-bypass", "evasion"]
license = "MIT"
name = "redstr"
readme = "README.md"
repository = "https://github.com/arvid-berndtsson/redstr"
version = "0.2.6"
[package.metadata.docs.rs]
all-features = true