☆18Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for ChromiumTaintTracking
Users that are interested in ChromiumTaintTracking are comparing it to the libraries listed below
Sorting:
- Exploit generator and Taint Engine to find persistent (and reflected) client-side XSS☆24Feb 27, 2020Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated this week
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- Simple warpper for AFL cgi binary fuzzing☆30Apr 24, 2016Updated 9 years ago
- ☆81Oct 14, 2012Updated 13 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- Make XSS Great Again☆31Nov 29, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- JITed Taint Tracking in V8☆15May 19, 2014Updated 11 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Session Manager and Middleware for Go net/http☆11Feb 11, 2025Updated last year
- Collect ALL the crx files☆15Feb 26, 2020Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆10Sep 4, 2020Updated 5 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- 批量查询域名备案;app;小程序☆19May 28, 2025Updated 9 months ago
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆12Aug 22, 2017Updated 8 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Modular, opensource, high performance G-code interpreter and CNC controller written in Object-Oriented C++☆10Jun 17, 2016Updated 9 years ago
- Voevodsky's notes on type systems. This version contains more material than the one on his website.☆11Jun 15, 2014Updated 11 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Notes about running Linux natively on the Google Pixel (completely getting rid of ChromeOS).☆20Sep 18, 2013Updated 12 years ago