Attacks against QUIC (CVE-2022-30591)
☆25Dec 31, 2022Updated 3 years ago
Alternatives and similar repositories for QUIC-attacks
Users that are interested in QUIC-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆24May 1, 2022Updated 3 years ago
- HTTP3-attacks (CVE-2022-30592)☆80Dec 18, 2022Updated 3 years ago
- ☆28Jun 7, 2022Updated 3 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated last year
- Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concept☆14Nov 10, 2023Updated 2 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆21Nov 10, 2025Updated 4 months ago
- 通过 ebpf(bcc) 在 TCP 包中插入 TOA,实现任意 TOA 伪造☆28Dec 12, 2023Updated 2 years ago
- tool of llm-based indirect-call analyzer☆30Feb 18, 2025Updated last year
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆16Jan 17, 2025Updated last year
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated 2 years ago
- Data Poisoning in Deep Learning: A Survey☆22Jan 18, 2026Updated 2 months ago
- ☆11Oct 10, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆18Aug 9, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- Slime是一个组合众多优秀安全工具的漏扫软件,它将目光集中在安全工具的组合上,而不是自己实 现漏扫的某一流程。☆17Sep 9, 2022Updated 3 years ago
- State-based Network AttacK Explorer (SNAKE) code☆14Sep 6, 2019Updated 6 years ago
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆21Updated this week
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection met…☆11Jul 22, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- Formalisation of a capability machine and principles for reasoning about security properties☆26Mar 12, 2026Updated last week
- 一个教你如何Review的学习平台☆17Oct 20, 2022Updated 3 years ago
- Kubernetes tools in a "distroless" container☆13Oct 30, 2023Updated 2 years ago
- ☆13Sep 22, 2025Updated 6 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- Capture Drift Funding Rates On-Chain -- if the funding rate is negative (longs get paid) then the vault opens a new long and captures the…☆10Apr 15, 2022Updated 3 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 7 years ago
- Proof of concept for CVE-2020-15257 in containerd.☆18Jan 12, 2021Updated 5 years ago