isec-tugraz / jstemplateLinks
JavaScript Template Attack proof-of-concept implementation
☆53Updated 7 years ago
Alternatives and similar repositories for jstemplate
Users that are interested in jstemplate are comparing it to the libraries listed below
Sorting:
- Extended Differential Fuzzing Framework☆325Updated 7 years ago
- Google Chrome extension implementing JavaScript Zero☆150Updated 7 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 8 years ago
- ☆242Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- A platform to study browser fingerprinting☆72Updated 2 years ago
- Miscellaneous☆20Updated 7 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆95Updated 7 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Safari local file reader☆122Updated 7 years ago
- A cross-platform browser fuzzing framework☆313Updated last week
- RegEx Denial of Service (ReDos) Scanner☆178Updated 8 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆71Updated 4 years ago
- ☆88Updated 8 years ago
- ☆252Updated 4 years ago
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆22Updated 8 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- A fuzzing library in JavaScript. ✨☆117Updated last week
- Vulncode-DB project☆578Updated 3 years ago
- AKA "Internet Chemotherapy"☆66Updated 7 years ago
- Camera Based Two Factor Authentication Through Mobile and Wearable Devices☆37Updated 8 years ago
- Automatically Preventing Code Injection Attacks on Node.js☆78Updated 3 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-con…☆58Updated 7 years ago
- Probe LAN devices from a web browser.☆79Updated 6 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated 2 years ago
- A framework for conducting large scale web privacy studies.☆75Updated 8 years ago
- system scanner☆219Updated 3 years ago
- Vulnerability scanner based on vulners.com audit API☆199Updated 7 years ago