DistriNet / evil-epubsLinks
Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.
☆32Updated 2 years ago
Alternatives and similar repositories for evil-epubs
Users that are interested in evil-epubs are comparing it to the libraries listed below
Sorting:
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 4 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆26Updated 3 years ago
- Yet another collection of Frida scripts.☆21Updated 3 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆16Updated 3 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Updated 3 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆22Updated 2 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- Collection of Semgrep rules for security analysis☆10Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- CVE-2020-5902☆9Updated 4 years ago
- CveXplore☆40Updated 2 weeks ago
- Damn Vulnerable ElectronJS App (DVEA)☆14Updated 7 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- XS-Leak Browser Test Suite☆81Updated last year
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 5 years ago