AntoineRondelet / uxss-vulnerabilities-researchLinks
Some research on UXSS vulnerabilities in web browsers
☆12Updated 7 years ago
Alternatives and similar repositories for uxss-vulnerabilities-research
Users that are interested in uxss-vulnerabilities-research are comparing it to the libraries listed below
Sorting:
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆52Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆15Updated 2 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- Inti easter challenge poc☆18Updated 4 years ago
- ☆12Updated 2 years ago
- CTF writeups☆30Updated 3 years ago
- Grammar-based HTTP/2 fuzzer with mutation ability☆47Updated 3 years ago
- List of Trusted Types bypasses☆102Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- A collection of client-side libraries with HTML injection vulnerabilities and DOM clobbering gadgets.☆37Updated 2 months ago
- ☆34Updated 3 years ago
- XS-Leak Browser Test Suite☆86Updated last year
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated 6 months ago
- Same Origin XSS challenge☆64Updated 3 years ago
- ☆56Updated 4 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆61Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 10 months ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆96Updated last year
- Testability Pattern Catalogs for SAST☆31Updated 8 months ago
- ☆60Updated 2 years ago
- PoC for leaking text nodes via CSS injection☆35Updated 7 years ago
- Companion repository of the "Dancer in the Dark" paper.☆19Updated last year
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Updated last year
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆67Updated 8 months ago
- My CTF challenges (2018~)☆28Updated 2 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆258Updated last year
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆47Updated 3 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago