Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.
☆33Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for evil-epubs
Users that are interested in evil-epubs are comparing it to the libraries listed below
Sorting:
- A tool for monitoring bug bounty programs across multiple platforms to track scope changes.☆32Feb 17, 2026Updated last week
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- A demo app vulnerable to directory traversal☆15May 3, 2020Updated 5 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Nov 17, 2025Updated 3 months ago
- the challenge generation framework for pwn.college☆22Nov 19, 2025Updated 3 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Aug 18, 2025Updated 6 months ago
- ☆26Oct 29, 2021Updated 4 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Extract endpoints from source files.☆25Mar 28, 2023Updated 2 years ago
- Fuzzing SILK with AFL☆25May 29, 2020Updated 5 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- ☆34Aug 28, 2024Updated last year
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- ☆38Aug 19, 2021Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Jul 17, 2017Updated 8 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 3 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- QueryFuzz implements a metamorphic testing approach to test Datalog engines.☆36Jun 8, 2021Updated 4 years ago
- Papers☆34Oct 29, 2019Updated 6 years ago
- Static code analysis test source code☆36Aug 30, 2023Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Mobbex payment gateway plugin for WooCommerce.☆12Feb 12, 2026Updated 2 weeks ago
- Client-Side Prototype Pollution Tools☆86Sep 21, 2021Updated 4 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- CTF challenges from redpwnCTF 2021☆31Jul 13, 2021Updated 4 years ago
- This repository explain how to write frida hook scripts and analysis written hooks.☆87Jun 13, 2023Updated 2 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Sep 2, 2019Updated 6 years ago
- Tools and our test data developed for the HackAPrompt 2023 competition☆47Oct 20, 2023Updated 2 years ago
- A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.☆97Oct 17, 2024Updated last year