SonarSource / argument-injection-vectorsLinks
A curated list of argument injection vectors
☆41Updated 7 months ago
Alternatives and similar repositories for argument-injection-vectors
Users that are interested in argument-injection-vectors are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 9 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 6 months ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- ☆84Updated last month
- ☆33Updated 2 years ago
- ☆21Updated last week
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 6 months ago
- php7.4.26-internalog☆13Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆24Updated 11 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last year
- ☆169Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- Dependency Confusion Security Testing Tool☆50Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆71Updated this week
- ☆16Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago