DistriNet / evil-epubsLinks
Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.
☆33Updated 3 years ago
Alternatives and similar repositories for evil-epubs
Users that are interested in evil-epubs are comparing it to the libraries listed below
Sorting:
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 5 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆56Updated 4 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Some of my public exploits☆51Updated 5 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- ☆51Updated 5 years ago
- ☆169Updated 4 years ago
- PDML importer for Burp Suite☆28Updated 5 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 6 years ago
- websocket-connection-smuggler☆66Updated 5 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- ☆16Updated 4 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- XS-Leak Browser Test Suite☆85Updated last year
- ☆38Updated 4 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago
- Slides and other material from various conference presentations.☆46Updated last month
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆95Updated 4 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆51Updated 2 years ago
- ☆72Updated 3 years ago
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago