HTTP Desync Attack
☆28May 17, 2020Updated 6 years ago
Alternatives and similar repositories for dc2020q-uploooadit
Users that are interested in dc2020q-uploooadit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alleycat plugin by devttys0, ported to IDA 8☆10Jan 15, 2025Updated last year
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- ☆21Jan 2, 2021Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Apr 28, 2025Updated last year
- Gets events from the Office 365 unified audit log and outputs their details into the pipeline☆16Dec 16, 2020Updated 5 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- ☆18Jun 24, 2021Updated 4 years ago
- Windows Common Log File System Driver POC☆94Dec 21, 2021Updated 4 years ago
- ☆21Sep 17, 2019Updated 6 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆394Aug 15, 2024Updated last year
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 8 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- ☆19Mar 24, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆35May 22, 2022Updated 3 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- LLVM-based ROP obfuscated compiler☆12Mar 24, 2022Updated 4 years ago
- Security Advisories☆38Feb 8, 2026Updated 3 months ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆78Oct 18, 2018Updated 7 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Analysis and exploitation of an use-after-free in ProFTPd☆14Jun 21, 2023Updated 2 years ago
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 3 years ago
- ☆46Sep 10, 2020Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Demo repository showcasing how to use reusable workflows to build artifact attestations☆16Apr 24, 2026Updated 3 weeks ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago