A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-concept exploit, showing how the slowdown may occur. The resources in this repository are provided for research purpose only. Please read below for more details.
☆60Dec 6, 2017Updated 8 years ago
Alternatives and similar repositories for ReDoS-vulnerabilities
Users that are interested in ReDoS-vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Doing research on top of Jalangi☆12Sep 9, 2016Updated 9 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- ☆11Feb 5, 2024Updated 2 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- LLVM compile-time performance data over time (repo 0).☆19Sep 30, 2023Updated 2 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Smart DNS Brute Forcer☆22Jul 16, 2012Updated 13 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- VilNE Scanner☆19Oct 19, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Laravel-Based Community CTF Platform☆17Updated this week
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.☆21May 29, 2017Updated 8 years ago
- Archive of talk materials.☆11Mar 2, 2023Updated 3 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago