leakuidatorplusteam / artifactsLinks
The Paper Artifact Availability
☆22Updated 3 years ago
Alternatives and similar repositories for artifacts
Users that are interested in artifacts are comparing it to the libraries listed below
Sorting:
- CQ, a code security scanner☆100Updated last year
- Network Traffic Fuzzer☆18Updated 8 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- ☆16Updated 5 months ago
- ☆50Updated last week
- The public release of LeftoverLocals code☆68Updated last year
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- A shortlist of core ServiceNow tables.☆14Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 6 months ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆43Updated this week
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆16Updated 8 months ago
- ☆79Updated last year
- Open YARA scan- and search engine☆24Updated 7 months ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆35Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Updated 3 years ago
- ☆13Updated 5 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- details about DIAL protocol vulnerabilities☆30Updated last year
- ☆63Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- ☆45Updated 3 years ago
- A command based package for simple display of statistics☆25Updated 9 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Man in the Browser Framework☆50Updated 9 months ago