leakuidatorplusteam / artifacts
The Paper Artifact Availability
☆21Updated 2 years ago
Alternatives and similar repositories for artifacts:
Users that are interested in artifacts are comparing it to the libraries listed below
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Fuzz Network Traffic☆18Updated 3 months ago
- A WASM CTF Challenge☆17Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆88Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- The public release of LeftoverLocals code☆65Updated last year
- ☆63Updated 2 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 4 years ago
- ☆17Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆15Updated 3 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 10 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- ☆26Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- ☆16Updated 9 months ago
- Man in the Browser Framework☆46Updated 4 months ago
- A framework for parsing binary data.☆17Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆13Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago