Here are
25 public repositories
matching this topic...
🎯 SQL Injection Payload List
在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入
Some ways to inject a DLL into a alive process
Code Injection, Inject malicious payload via pagetables pml4.
Recovery of Plaintext iMessage Data Without Breaking Crypto
Updated
Apr 9, 2016
JavaScript
Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"
Updated
Jul 31, 2017
Python
XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!
Updated
Aug 26, 2018
JavaScript
汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中
Encrypts 64-bit elf files that decrypt at runtime.
StrandHogg Task Injection POC
Updated
Dec 27, 2019
Kotlin
Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and safe test environment
Updated
Aug 14, 2020
Shell
Decorate the ruby CSV library to sanitize output CSV against CSV injection attacks.
Vulnerable functionality is in automatic USB upgrade process. It is possible to inject additional commands via malicious files names.
Poirot: grammar-based injection fuzzer for black box systems
Updated
Jan 29, 2021
OCaml
A wide collection of tools for specific exploitations...
Updated
Jan 4, 2018
Python
Source code to execute signal injection attacks against CCD image sensors
Updated
Aug 26, 2021
Jupyter Notebook
Secure multi-execution to mitigate injection vulnerabilities
Simple Command Injection Scanner for Web Applications with the intent of automatic testing.
Updated
Oct 8, 2021
Python
Simple web input/cookie/url fuzzer written in python.
Updated
Dec 5, 2020
Python
Recurse Center presentation on how to secure web applications
Updated
Mar 30, 2017
HTML
Scan your JS source code for potential SQL injection vectors
Updated
Jun 11, 2021
JavaScript
Updated
Aug 16, 2020
Python
MiTM attack to inject JS code in a public WiFi hotspot, initially to cryptocurrency
Updated
Jan 9, 2018
Python
Using libusb to re-implement the tool that prevents HID attacks.
overpass tryhackme room documentation
Improve this page
Add a description, image, and links to the
injection-attacks
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
injection-attacks
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.