Towards Machine-Checked Analysis of Browser Security Mechanisms
☆12Jun 17, 2024Updated last year
Alternatives and similar repositories for webspec
Users that are interested in webspec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Language-independent Synthesis of Firewall Policies☆26Jan 6, 2023Updated 3 years ago
- ☆14Jun 16, 2022Updated 3 years ago
- ☆20Mar 5, 2023Updated 3 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- EmerCoin Official Development Tree☆10Jul 26, 2016Updated 9 years ago
- Python language bindings for ev3dev☆18Feb 9, 2017Updated 9 years ago
- Personal use bot for students☆26Oct 1, 2021Updated 4 years ago
- Node.js script for generating animations for kiibohd configurator import☆13May 14, 2020Updated 5 years ago
- List of all ProtonVPN VPN servers IPs.☆16Nov 29, 2023Updated 2 years ago
- ☆28Aug 19, 2019Updated 6 years ago
- Simple script to test WAFs☆14Feb 10, 2017Updated 9 years ago
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- a cythonized, extended version of the interval search tree in bx☆30Jun 4, 2019Updated 6 years ago
- Cookie Crumbles: Breaking and Fixing Web Session Integrity☆24Aug 9, 2023Updated 2 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆122Mar 9, 2026Updated 2 weeks ago
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 6 months ago
- A few simple examples showing how to communicate with the TypeScript server, tsserver.☆18May 18, 2022Updated 3 years ago
- ☆19Jun 1, 2024Updated last year
- Me trying to explain some CTF challenges I liked and exploited \0/☆15May 3, 2021Updated 4 years ago
- Open Source STIG Viewer Reimplementation☆26Jun 3, 2025Updated 9 months ago
- This module contains DSC resources to manage WMI Namespace Security.☆22Sep 28, 2018Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- VirtuAlization GDb integrations in pwntools☆38Jan 6, 2026Updated 2 months ago
- A small Coq library for collecting side conditions and deferring their proof☆26Oct 14, 2019Updated 6 years ago
- ☆20May 11, 2023Updated 2 years ago
- ☆17Jan 29, 2020Updated 6 years ago
- A framework for the detection of COSI vulnerabilities / XS-Leaks☆14Mar 29, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Data and information related to the Books3 dataset included as part of The Pile, and used to train Meta's LLaMA among others☆36May 10, 2025Updated 10 months ago
- Ru-WireGuard: WireGuard protocol with GOST crypto algorithms☆28Dec 23, 2020Updated 5 years ago
- NES programming in Haskell? No way!☆39Dec 2, 2015Updated 10 years ago
- Google Translate Translation Exploit☆10Mar 4, 2019Updated 7 years ago
- Mobile TSS utility; Search blobs by ECID, List all firmwares being signed, List device blobs for current device☆14Dec 23, 2014Updated 11 years ago
- Tiny proof-of-concept PowerShell script to do threat hunting using ChatGPT (text-davinci-003)☆28Feb 14, 2023Updated 3 years ago
- An engine + analysis interface for duck chess☆23Jun 4, 2024Updated last year
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Abhi0323 / RAG-Powered-AI-Assistant-Transforming-Data-Retrieval-and-Analysis-Across-the-Web-and-PDFsHarness the power of Retrieval-Augmented Generation with the Personal AI Assistant, an innovative tool designed to extract and synthesize…☆33Jun 7, 2024Updated last year
- Modified SuperTuxKart to support sending CANBus messages☆12Dec 9, 2014Updated 11 years ago