☆17Nov 28, 2021Updated 4 years ago
Alternatives and similar repositories for css-exfiltration-svg-font
Users that are interested in css-exfiltration-svg-font are comparing it to the libraries listed below
Sorting:
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- EBot - 棱角社区攻防日报企业微信机器人☆17Nov 24, 2021Updated 4 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆61Dec 18, 2025Updated 2 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Infrastructure for the Potluck CTF☆25Mar 11, 2024Updated last year
- via load data local infile to attack client☆30Oct 29, 2019Updated 6 years ago
- WeCTF 2022 Source Code & Organizer's Writeup☆31Jun 12, 2022Updated 3 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- Electron Research☆73Feb 9, 2022Updated 4 years ago
- Research paper repository for "A Hand Structure-Based Mobile Authentication Solution to the Security-Reliability Trade-off" Paper from NJ…☆13Jul 30, 2023Updated 2 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated last week
- ☆10Oct 26, 2020Updated 5 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- ☆13Nov 18, 2025Updated 3 months ago
- ☆11Dec 5, 2024Updated last year
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last month
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- List of Trusted Types bypasses☆102Apr 15, 2024Updated last year
- ☆46Jul 13, 2021Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ReverseJS: A blog focused on reverse engineering Javascript☆11Feb 9, 2024Updated 2 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- My notes for any technologies of Web, Tech, etc.☆10Feb 16, 2020Updated 6 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- ActiveMQ Deserialization RCE☆15Aug 30, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Let's build the quickest snippet reference for every programming language, free to use and modify.☆13Feb 7, 2022Updated 4 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- The home for ACM Cyber at UCLA! Website for the premier cybersecurity club at UCLA.☆12Updated this week
- CVE-2020-2555☆14Mar 10, 2020Updated 6 years ago