DistriNet / evil-epubsLinks
Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.
β33Updated 3 years ago
Alternatives and similar repositories for evil-epubs
Users that are interested in evil-epubs are comparing it to the libraries listed below
Sorting:
- An easy to navigate list of unicode characters that have risky transformations π₯β25Updated 3 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).β29Updated 5 years ago
- an Evil Java RMI Registry.β51Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.β31Updated 6 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clientsβ70Updated 4 years ago
- β56Updated 4 years ago
- A collection of my Semgrep rulesβ51Updated 2 years ago
- β65Updated 4 years ago
- Searcher for cross-site leaks (XS-Leaks)β82Updated 3 years ago
- websocket-connection-smugglerβ66Updated 6 years ago
- β95Updated 4 years ago
- β170Updated 4 years ago
- β16Updated 2 months ago
- Some of my public exploitsβ52Updated 5 years ago
- PDML importer for Burp Suiteβ28Updated 5 years ago
- β25Updated last year
- XS-Leak Browser Test Suiteβ85Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.β77Updated 5 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.β16Updated 4 years ago
- Query various sources for CVE proof-of-conceptsβ53Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.β36Updated 5 years ago
- A collection of utilities to simplify the creation of Burp Suite pluginsβ22Updated 2 years ago
- HTTP Desync Attackβ28Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding Inβ¦β19Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.β86Updated 2 years ago
- A curated list of argument injection vectorsβ41Updated last year
- Compiled dataset of Java deserialization CVEsβ60Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on itβ18Updated 5 years ago
- β51Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVEβ2021β44228)?β45Updated 3 years ago