Top 15 corsproxy Alternative and Similar Softwares | Dec 2024

CORS is a technology specification to get around the Same Origin Policy restrictions of web browsers. To allow cross domain sharing, web servers have to attach additional headers. Unfortunately, not many servers have done this yet, and hence we have issues trying to access their resources in certain scenarios such as WebGL. This simple nodejs proxy will attach the CORS headers so that the browser thinks it is okay to be shared.

1. CORS & SSL Proxy

CORS & SSL Proxy It’s a fast, reliable proxy that you can use to connect to APIs, which don’t support CORS or HTTPS or both.......

2. CORS Proxy

CORS Proxy über-simple node.js-Proxy to enable CORS request for any website.......

3. CORS Anywhere

CORS Anywhere CORS Anywhere is a NodeJS proxy which adds CORS headers to the proxied request.......

4. Any Origin

Any Origin Any Origin. Same-Origin-Policy? Not on my watch.Cross domain jsonp access.......

5. crossorigin.me

crossorigin.me crossorigin.me, the free CORS proxy for everyone!A CORS proxy is a service that allows developers (probably you) to access resources from other websites, without having to own that website.......

6. Whatever Origin

Whatever Origin Whatever Origin is an open source alternative to AnyOrigin.comWhen I was facing Same Origin problems while developing Bitcoin Pie, I was excited to discover how anyorigin.com solved the issue for me ... only, a week later it stopped working for some https sites.......

7. Negotiator

Negotiator Surf the web on your termsCustom cleaning/blocking of the HTTP requests combining blocking features from RequestPolicy and referer changes from RefControl and lots more.You must define what to block yourself:Define filters in pairs of referer-target(optional wildcard) and assign an action.Actions can be block or one of your custom header operations.......

8. KeyCDN

KeyCDN KeyCDN is a SSD-optimized Content Delivery Network (CDN) that offers transparent prices, a real-time dashboard. KeyCDN comes with lot's of features for free such as origin shield, custom SSL, secure token, raw logs in real time and many more. There's no commitment required and KeyCDN......

9. sploit.io

sploit.io We host only the best cyber security tools for you to use at your disposal; we simplify the scripts to make it quicker and easier to use. Simply point our service towards your website or network and see the information roll in.......

10. Zed Attack Proxy

Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.ZAP......

11. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

12. RequestPolicy

RequestPolicy RequestPolicy is an extension for Mozilla browsers that improves the privacy and security of your browsing by giving you control over when cross-site requests are allowed by webpages you visit. It is the first comprehensive client-side protection against CSRF attacks and the first tool to enable the use of modern......

13. Arachni

Arachni Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.......

14. SecApps

SecApps Find security vulnerabilities right from your browser. Experience the next generation security tools without the need to install any additional software......

15. edgescan

edgescan edgescan is a cloud-based continuous vulnerability management and penetration testing solution. It is a highly accurate SaaS (Security-as-a-Service) solution which helps clients to discover, and manage application and network vulnerabilities (full-stack information security) on an ongoing basis. All vulnerabilities are verified by our security analysts which results in accurate, "false-positive......