JacksonGL / NPM-Vuln-PoCView external linksLinks
Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]
☆42Jun 22, 2024Updated last year
Alternatives and similar repositories for NPM-Vuln-PoC
Users that are interested in NPM-Vuln-PoC are comparing it to the libraries listed below
Sorting:
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- A zoo for malicious NPM packages☆20Dec 8, 2022Updated 3 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 6 years ago
- Reacting to content with GPT-4V, OpenAI tts, Cloudflare Workers and Mac shortcuts☆21Nov 29, 2023Updated 2 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Mar 29, 2018Updated 7 years ago
- Secure Coding in Python☆22Oct 11, 2024Updated last year
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- 💥 Awesome things in Kaboom.js☆21May 26, 2024Updated last year
- Simplified pure Java http server☆11May 20, 2022Updated 3 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Aug 10, 2021Updated 4 years ago
- VUDDY & hmark for IoTcube☆22Apr 28, 2023Updated 2 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428☆29Aug 22, 2022Updated 3 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- Anki decks for Technion courses☆12Apr 26, 2024Updated last year
- CLI for a painless way to upgrade your package.json dependencies!☆48Apr 14, 2022Updated 3 years ago
- ☆30May 23, 2017Updated 8 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- ☆267Mar 19, 2019Updated 6 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- Package verification for npm☆62Feb 12, 2022Updated 4 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆67Aug 6, 2020Updated 5 years ago
- Homework for STAT 205A - Berkeley☆13Dec 9, 2014Updated 11 years ago
- Course Projects for CS 61B, the data structures class at UC Berkeley, Spring 2014☆10Oct 7, 2014Updated 11 years ago
- A Reproducible Untargeted Metabolomics Data Processing Pipeline☆11Mar 18, 2021Updated 4 years ago
- ☆10May 4, 2019Updated 6 years ago
- A Very Vulnerable Node.js Express.js Web Application and API. Used for testing Security tools, Application security and penetration testi…☆42Aug 26, 2024Updated last year