leakuidatorplusteam / artifacts
The Paper Artifact Availability
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for artifacts
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆14Updated 11 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Open YARA scan- and search engine☆16Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆17Updated 5 months ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆29Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- ☆69Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- DEbian Cve REproducer Tool☆22Updated last year
- ☆15Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- Checks for tpm vulnerabilities☆36Updated last year
- Towards Machine-Checked Analysis of Browser Security Mechanisms☆11Updated 4 months ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆14Updated 6 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- ☆39Updated last month
- Searcher for cross-site leaks (XS-Leaks)☆81Updated last year
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 4 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆41Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated last month
- details about DIAL protocol vulnerabilities☆27Updated 11 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- ☆13Updated 4 years ago
- Custom semgrep rules registry☆12Updated 2 years ago
- A collection of domain lists obtained from zone-walking TLDs. Updated daily.☆17Updated this week
- ☆18Updated 7 years ago