moloch-- / reasonably-secure-electron
A pattern for reasonably secure Electron applications
☆72Updated 2 years ago
Alternatives and similar repositories for reasonably-secure-electron:
Users that are interested in reasonably-secure-electron are comparing it to the libraries listed below
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆37Updated 2 months ago
- ☆34Updated 2 years ago
- PoC for leaking text nodes via CSS injection☆36Updated 6 years ago
- TypeScript/JavaScript client libraries for Sliver☆20Updated last year
- NAT Slipstream attack code samples☆46Updated 3 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated last year
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- Some of my public exploits☆51Updated 4 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆46Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆25Updated 2 years ago
- CTF writeups☆30Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 2 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- A curated list of argument injection vectors☆40Updated 3 weeks ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- RCE in Slanger using deserialization of Ruby objects☆11Updated 5 years ago
- ☆31Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆40Updated 2 years ago
- async parser for JET☆24Updated last year
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆37Updated 4 years ago
- ☆59Updated 2 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- ☆68Updated 2 years ago
- Security Research☆36Updated 3 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated last year