leakuidatorplusteam / artifactsLinks
The Paper Artifact Availability
☆21Updated 2 years ago
Alternatives and similar repositories for artifacts
Users that are interested in artifacts are comparing it to the libraries listed below
Sorting:
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆17Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆13Updated 4 years ago
- Fuzz Network Traffic☆18Updated 6 months ago
- This is both a terrible and wonderful idea.☆12Updated 5 years ago
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆16Updated 5 months ago
- A WASM CTF Challenge☆18Updated 6 years ago
- AXFR all the things!☆26Updated 5 months ago
- ☆16Updated 2 months ago
- Geolocate your files!☆16Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- A command based package for simple display of statistics☆23Updated 6 months ago
- the puppy proxy☆22Updated 5 years ago
- ☆19Updated 8 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆15Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Scan and decode NetWire logs☆12Updated 2 years ago
- Research on abusing GitLab Runners☆26Updated 4 years ago
- DEbian Cve REproducer Tool☆25Updated last week
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- CLI and API server for https://github.com/dreadnode/robopages☆33Updated last month
- Open YARA scan- and search engine☆24Updated 4 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆12Updated 8 months ago
- Man in the Browser Framework☆48Updated 6 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago