DistriNet / evil-epubsLinks
Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.
☆33Updated 3 years ago
Alternatives and similar repositories for evil-epubs
Users that are interested in evil-epubs are comparing it to the libraries listed below
Sorting:
- A collection of my Semgrep rules☆49Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- ☆169Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- XS-Leak Browser Test Suite☆85Updated last year
- ☆56Updated 4 years ago
- websocket-connection-smuggler☆66Updated 5 years ago
- ☆72Updated 3 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 5 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- ☆33Updated 2 years ago
- Some of my public exploits☆51Updated 5 years ago
- ☆21Updated last week
- ☆16Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 6 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- ☆64Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 9 months ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 5 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 6 months ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆95Updated 4 years ago