AntoineRondelet / uxss-vulnerabilities-researchLinks
Some research on UXSS vulnerabilities in web browsers
☆12Updated 7 years ago
Alternatives and similar repositories for uxss-vulnerabilities-research
Users that are interested in uxss-vulnerabilities-research are comparing it to the libraries listed below
Sorting:
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- Companion repository of the "Dancer in the Dark" paper.☆20Updated last year
- Inti easter challenge poc☆18Updated 4 years ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆54Updated 2 years ago
- Testability Pattern Catalogs for SAST☆31Updated 10 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆97Updated 2 years ago
- CTF writeups☆30Updated 3 years ago
- ☆60Updated 2 years ago
- My CTF Challenges☆23Updated 2 years ago
- Grammar-based HTTP/2 fuzzer with mutation ability☆47Updated 3 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆74Updated last year
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆69Updated 10 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- XS-Leak Browser Test Suite☆87Updated 2 years ago
- ☆12Updated 2 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Updated 8 months ago
- jws2pubkey tool☆41Updated 6 months ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- ☆111Updated 3 years ago
- ☆34Updated 3 years ago
- Simple taint analyzer for PHP/WordPress using VKCOM/php-parser☆18Updated 3 years ago
- ☆56Updated 4 years ago
- Challenge attachments for RWCTF 3rd.☆91Updated 4 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆259Updated last year
- PoC for leaking text nodes via CSS injection☆35Updated 7 years ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆116Updated 3 months ago