doyensec / Unsafe-UnpackingLinks
Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide
☆42Updated last year
Alternatives and similar repositories for Unsafe-Unpacking
Users that are interested in Unsafe-Unpacking are comparing it to the libraries listed below
Sorting:
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 11 months ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- A collection of my Semgrep rules☆51Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- ☆33Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- ☆130Updated last week
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆35Updated 10 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- ☆22Updated last month
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 months ago
- ☆16Updated last month
- ☆27Updated last year
- POC for CVE-2022-23648☆36Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Updated 3 years ago
- ☆80Updated 10 months ago
- ☆170Updated 4 years ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated 3 weeks ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆18Updated last year
- Slides and other material from various conference presentations.☆46Updated 4 months ago
- CTF writeups☆30Updated 3 years ago
- ☆24Updated 3 years ago
- ☆21Updated 4 months ago
- ☆16Updated 4 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- ☆56Updated 4 years ago