doyensec / Unsafe-UnpackingLinks
Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide
☆41Updated 7 months ago
Alternatives and similar repositories for Unsafe-Unpacking
Users that are interested in Unsafe-Unpacking are comparing it to the libraries listed below
Sorting:
- Simple WebSocket fuzzer☆33Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- A curated list of argument injection vectors☆41Updated 6 months ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- ☆21Updated 2 months ago
- ☆26Updated last year
- ☆23Updated 6 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆36Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 5 months ago
- ☆31Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆17Updated 10 months ago
- CTF writeups☆30Updated 3 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆33Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 9 months ago
- Slides and other material from various conference presentations.☆45Updated 2 months ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 2 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆51Updated last year
- ☆78Updated 5 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆51Updated last year
- ☆116Updated 2 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆101Updated last month
- ☆166Updated 3 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆14Updated 2 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago