AntoineRondelet / uxss-vulnerabilities-research
Some research on UXSS vulnerabilities in web browsers
☆11Updated 6 years ago
Alternatives and similar repositories for uxss-vulnerabilities-research:
Users that are interested in uxss-vulnerabilities-research are comparing it to the libraries listed below
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- CTF writeups☆30Updated 2 years ago
- ☆15Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆40Updated 4 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆45Updated last year
- ☆34Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 6 months ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆9Updated 5 years ago
- ☆16Updated last month
- Chrome extension to detect possible xsleaks☆12Updated 5 years ago
- ☆32Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 2 years ago
- ☆12Updated 2 years ago
- ☆20Updated 2 years ago
- PoC for leaking text nodes via CSS injection☆36Updated 6 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated last year
- RCE in Slanger using deserialization of Ruby objects☆11Updated 6 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- ☆14Updated 4 months ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- ☆16Updated 3 years ago
- ☆36Updated 3 years ago
- HTTP Desync Attack☆28Updated 4 years ago
- Same Origin XSS challenge☆56Updated 3 years ago
- AI chromium security wiki☆25Updated this week
- A python-based padding oracle tool☆20Updated 8 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year