leakuidatorplusteam / artifactsLinks
The Paper Artifact Availability
☆21Updated 3 years ago
Alternatives and similar repositories for artifacts
Users that are interested in artifacts are comparing it to the libraries listed below
Sorting:
- Network Traffic Fuzzer☆17Updated last year
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- CQ, a code security scanner☆100Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 7 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- ☆45Updated 4 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Updated 3 years ago
- A shortlist of core ServiceNow tables.☆15Updated 2 years ago
- A WASM CTF Challenge☆18Updated 6 years ago
- A curated list of argument injection vectors☆41Updated 11 months ago
- ☆16Updated 5 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆17Updated last year
- Collection of Semgrep rules for security analysis☆10Updated last year
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- ☆24Updated last year
- Open YARA scan- and search engine☆25Updated 10 months ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- ☆65Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago