mikispag / rosettaflashLinks
A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass thanks to JSONP abuse.
☆109Updated last year
Alternatives and similar repositories for rosettaflash
Users that are interested in rosettaflash are comparing it to the libraries listed below
Sorting:
- XXE OOB Exploitation Toolset for Automation☆62Updated 11 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- ☆86Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 7 years ago
- ☆77Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Heartbleed (CVE-2014-0160) client exploit☆323Updated 9 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- ☆94Updated 7 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Updated 6 years ago
- ☆44Updated 10 years ago
- A simple way for detection the remote user's antivirus☆84Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 8 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 6 years ago
- some tasks/solutions from CTF challenges☆67Updated 8 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- Webkit uxss exploit (CVE-2017-7089)☆64Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Updated 11 years ago