This is the repository for the paper "Cross Miniapp Request Forgery"
☆20Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for CMRFScanner
Users that are interested in CMRFScanner are comparing it to the libraries listed below
Sorting:
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Mar 19, 2024Updated 2 years ago
- 加密app渗透测试包,用于brida和frida练习hook逆向技术的安卓apk源码。尝试暴破出加密密码并进行登录即可通关。自动加解密。Brida+burpsuite联动(自动加解密APP请求参数)演示视频在我的Bilibili。☆19Mar 27, 2025Updated 11 months ago
- An Empirical Study of AI Techniques in Mobile Applications☆12May 28, 2024Updated last year
- Download resources from TikTok/Douyin, YouTube, Bilibili, Facebook, Instagram, and X/Twitter - A web crawler for the video parsing API of…☆19Jan 10, 2026Updated 2 months ago
- Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作☆12Aug 9, 2023Updated 2 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- 淘宝自动抢购☆10Mar 27, 2019Updated 6 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- ☆20Jun 23, 2021Updated 4 years ago
- (outdated) Endpoint Void uses to check for updates.☆12Dec 12, 2025Updated 3 months ago
- Search and download applications from apkpure.com☆17Apr 18, 2023Updated 2 years ago
- MS17010 Scan / 转自长亭科技☆24Feb 27, 2021Updated 5 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- Taobao Auto Purchase Tool/ 简单的淘宝自动秒杀☆16May 24, 2023Updated 2 years ago
- ☆13Jun 15, 2024Updated last year
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- swagger接口测试☆18Jun 12, 2025Updated 9 months ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆26Updated this week
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- ☆12Jan 27, 2022Updated 4 years ago
- Find context neurons in Pythia models.☆13Jun 13, 2023Updated 2 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- Source code of PurPliance analysis tool.☆18Mar 11, 2024Updated 2 years ago
- app to play with Frida tool☆52Apr 4, 2024Updated last year
- Cobalt Strike 插件包,超级缝合怪...☆11Jul 11, 2025Updated 8 months ago
- Here is Hacking-Group-0872-Slide☆33Apr 20, 2024Updated last year
- Computationally friendly hyper-parameter search with DP-SGD☆25Jan 7, 2025Updated last year
- Improved DP-SGD for optimizing☆20Mar 23, 2019Updated 6 years ago
- LLamaIndex's custom LLM, a Proxy-enabled version of Gemini!☆10Apr 30, 2024Updated last year
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- GPTZoo: A Large-scale Dataset of GPTs for the Research Community☆25Jun 18, 2024Updated last year
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆78Feb 5, 2018Updated 8 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago