SonarSource / argument-injection-vectorsLinks
A curated list of argument injection vectors
☆41Updated 5 months ago
Alternatives and similar repositories for argument-injection-vectors
Users that are interested in argument-injection-vectors are comparing it to the libraries listed below
Sorting:
- ☆115Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 7 months ago
- An Evil OIDC Server☆53Updated 2 years ago
- ☆65Updated 2 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆33Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 4 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 4 months ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- php7.4.26-internalog☆13Updated 2 years ago
- ☆21Updated last month
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆24Updated 9 months ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Utility for creating ZipSlip archives☆73Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- Dependency Confusion Security Testing Tool☆48Updated 2 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- Java archive implant toolkit.☆61Updated 2 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆16Updated 2 years ago
- ☆17Updated 3 years ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- ☆37Updated 3 weeks ago