sola-da / ReDoS-vulnerabilitiesView external linksLinks
A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-concept exploit, showing how the slowdown may occur. The resources in this repository are provided for research purpose only. Please read below for more details.
☆60Dec 6, 2017Updated 8 years ago
Alternatives and similar repositories for ReDoS-vulnerabilities
Users that are interested in ReDoS-vulnerabilities are comparing it to the libraries listed below
Sorting:
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 7 years ago
- Smart DNS Brute Forcer☆22Jul 16, 2012Updated 13 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- Moved to https://codeberg.org/DNS-OARC/dnsjit☆61Feb 4, 2026Updated last week
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆38Feb 7, 2019Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- 数据库安全审计平台☆64Oct 31, 2018Updated 7 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- Moved to https://codeberg.org/DNS-OARC/drool☆82Feb 4, 2026Updated last week
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- PoC for leaking text nodes via CSS injection☆35Aug 20, 2018Updated 7 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 5 months ago
- Android and iOS source for the Empire mobile app☆90Feb 20, 2019Updated 6 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Minimalistic DNS logging tool☆43Jan 13, 2022Updated 4 years ago