Some research on UXSS vulnerabilities in web browsers
☆12May 14, 2018Updated 7 years ago
Alternatives and similar repositories for uxss-vulnerabilities-research
Users that are interested in uxss-vulnerabilities-research are comparing it to the libraries listed below
Sorting:
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Safe communication between main process and renderer processes in Electron☆26Nov 5, 2015Updated 10 years ago
- Launch your SOC as fast as a rocket with only one command☆12Feb 17, 2025Updated last year
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated 2 weeks ago
- Identifying Nuances in Fake News vs. Satire: Using Semantic and Linguistic Cues (NLP4IF, EMNLP-IJCNLP 2019)☆11Dec 21, 2020Updated 5 years ago
- Zsh completion plugin for the LLM CLI tool by Simon Willison☆20May 28, 2025Updated 9 months ago
- List of Trusted Types bypasses☆102Apr 15, 2024Updated last year
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ☆11Apr 3, 2021Updated 4 years ago
- A-Frame GLTF Exporter component☆13Apr 13, 2018Updated 7 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- Documentation for Pixura NFT APIs☆11Oct 26, 2018Updated 7 years ago
- ☆12Mar 8, 2023Updated 3 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- DHCP starvation utility☆10Mar 25, 2017Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago
- Fire effect in awk☆12Jan 25, 2022Updated 4 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Unofficial Python library for hiveengine☆11Aug 22, 2025Updated 6 months ago
- CECS 342 Lab 4: Logic Languages with SWI-Prolog☆13Nov 19, 2021Updated 4 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- ☆15Jun 15, 2021Updated 4 years ago
- Non-interactive Java debugger with Groovy☆80Apr 11, 2024Updated last year
- 一些学习笔记 Good Good Study Day Day Up !☆12Mar 1, 2023Updated 3 years ago
- Node.js CLI Client for Tezos using eztz.js☆14Nov 25, 2017Updated 8 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago