cgvwzq / css-scrollbar-attackLinks
PoC for leaking text nodes via CSS injection
☆35Updated 7 years ago
Alternatives and similar repositories for css-scrollbar-attack
Users that are interested in css-scrollbar-attack are comparing it to the libraries listed below
Sorting:
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- CTF Writeups☆39Updated 7 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Updated 5 years ago
- CTF writeups☆30Updated 3 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago
- justCTF 2019 challenges sources☆38Updated 4 years ago
- research☆151Updated last year
- notes and code on past CTFs☆102Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34Updated 6 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Updated 6 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- My CTF Challenges☆23Updated 2 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆158Updated 6 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- DupeKeyInjector☆136Updated 3 years ago
- Some exploits to bypass Safer Mode in Ghostscript☆17Updated 5 years ago
- ☆26Updated 4 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆81Updated 6 years ago
- ☆54Updated 7 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Updated 7 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆127Updated 5 months ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 9 years ago
- Some of my public exploits☆51Updated 5 years ago