justinsteven / advisoriesLinks
☆272Updated 2 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- The request.bin of DNS request☆238Updated 7 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 10 years ago
- Unicode Security Guide☆120Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆506Updated 4 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 3 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- DNS Rebinding Exploitation Framework☆493Updated 4 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- Cure53 Browser Security White Paper☆299Updated 7 years ago
- Code Review Audit Script Scanner☆141Updated 3 weeks ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- Tool to help with the exploitation of web application race conditions☆183Updated 7 years ago
- A tiny and cute URL fuzzer☆399Updated 2 years ago
- research☆151Updated last year
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆656Updated 3 years ago
- TLS Redirection☆120Updated 7 years ago
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆438Updated 6 months ago
- ☆232Updated 6 years ago
- A Tool for DNS Delegation Trust Graphing☆404Updated 2 years ago
- Utils☆273Updated 9 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- All my infosec notes I have been building up over the years☆334Updated 8 months ago
- Minimal code to connect to a CEF debugger.☆209Updated 5 years ago
- secretz, minimizing the large attack surface of Travis CI☆327Updated 3 years ago
- Burp extension to perform Java Deserialization Attacks☆214Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆292Updated 6 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago