<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Httpsonly</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Httpsonly"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Httpsonly"/>
		<updated>2026-04-23T13:27:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222133</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222133"/>
				<updated>2016-10-05T12:11:40Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in regular expressions, which can cause bypass of written rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222132</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222132"/>
				<updated>2016-10-05T12:11:32Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222131</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222131"/>
				<updated>2016-10-05T12:11:18Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222130</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222130"/>
				<updated>2016-10-05T12:11:12Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Cheatsheet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222129</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222129"/>
				<updated>2016-10-05T12:10:51Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Other Cheatsheets */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222128</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222128"/>
				<updated>2016-10-05T12:10:39Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222127</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222127"/>
				<updated>2016-10-05T12:10:26Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.  &lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222126</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222126"/>
				<updated>2016-10-05T12:10:10Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.  &lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222125</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222125"/>
				<updated>2016-10-05T12:10:02Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* Authors and Primary Editors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.  &lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&lt;br /&gt;
(c) Vladimir Ivanov&lt;br /&gt;
@httpsonly&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Vladimir Ivanov&amp;lt;br&amp;gt;&lt;br /&gt;
[http://twitter.com/httpsonly @httpsonly]&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222124</id>
		<title>Regular Expression Security Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_Expression_Security_Cheatsheet&amp;diff=222124"/>
				<updated>2016-10-05T12:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Httpsonly: /* DRAFT CHEAT SHEET - WORK IN PROGRESS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Regular Expression Security Cheatsheet =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This cheatsheet can be effectively used by security specialists and programmers to reveal unwanted constructions in their regular expressions, which can cause bypass of their rules.&amp;lt;br&amp;gt;&lt;br /&gt;
Despite original work was focused on finding &amp;quot;weak places&amp;quot; in regular expressions of Intrusion Detection Systems (WAFs), it can be effectively applied to any other code.  &lt;br /&gt;
&lt;br /&gt;
== Cheatsheet == &lt;br /&gt;
&lt;br /&gt;
Due to the fact, that OWASP's MediaWiki styling could not compete to Markdown, I decided not to include full table here, but provide a link to GitHub repository instead:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet https://github.com/attackercan/regexp-security-cheatsheet] ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SAST ==&lt;br /&gt;
&lt;br /&gt;
In order to save time for security practitioners, Static Application Security Testing tool was written. You can use the following code to analyse all regular expressions from your PHP project:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
grep -iorP &amp;quot;reg_\w+\s*\((\s*['\&amp;quot;](.*?)['\&amp;quot;]),&amp;quot; * &amp;gt; regexp.txt &amp;amp;&amp;amp; php index.php --file=&amp;quot;./regexp.txt&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SAST can be downloaded from here:&lt;br /&gt;
=== [https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser https://github.com/attackercan/regexp-security-cheatsheet/tree/master/RegexpSecurityParser] ===&lt;br /&gt;
&lt;br /&gt;
(c) Vladimir Ivanov&lt;br /&gt;
@httpsonly&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Httpsonly</name></author>	</entry>

	</feed>