leakuidatorplusteam / artifactsLinks
The Paper Artifact Availability
☆21Updated 2 years ago
Alternatives and similar repositories for artifacts
Users that are interested in artifacts are comparing it to the libraries listed below
Sorting:
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- CQ, a code security scanner☆100Updated last year
- ☆13Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆48Updated last week
- ☆12Updated 4 years ago
- ☆16Updated 3 months ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 5 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A WASM CTF Challenge☆18Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 3 years ago
- A shortlist of core ServiceNow tables.☆14Updated last year
- ☆77Updated last year