SonarSource / argument-injection-vectors
A curated list of argument injection vectors
☆41Updated 3 months ago
Alternatives and similar repositories for argument-injection-vectors
Users that are interested in argument-injection-vectors are comparing it to the libraries listed below
Sorting:
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 5 months ago
- ☆64Updated 2 weeks ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 2 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆32Updated 2 years ago
- ☆16Updated last year
- A collection of my Semgrep rules☆49Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆23Updated 11 months ago
- An Evil OIDC Server☆53Updated 2 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆16Updated 6 months ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆34Updated last month
- ☆114Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆22Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- ☆23Updated 3 months ago
- A list of weird comparison in SQL☆15Updated 2 years ago
- ☆27Updated 2 years ago
- ☆14Updated 5 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- php7.4.26-internalog☆13Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year
- Java archive implant toolkit.☆60Updated 3 weeks ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆22Updated 7 months ago