black-hat-rust
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
Our great sponsors
black-hat-rust | CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | |
---|---|---|
48 | 7 | |
3,014 | 321 | |
2.0% | - | |
4.3 | 0.0 | |
6 months ago | over 1 year ago | |
Rust | HTML | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
black-hat-rust
-
Cloudflare for Speed and Security
Bonuses: If you purchase Cloudflare for Speed and Security before November 4, 2023, you'll get my bestseller, Black Hat Rust, for free! Yes, you read it right, two books for less than the price of one!
-
[Question] Does Rusts safety features make it less useful for pentesting?
Black Hat Rust
-
Offensive Rust
You mean like this? https://kerkour.com/black-hat-rust
-
Learn Rust, Offensive Security and Applied Cryptography
Some say that Rust is ugly or too hard write. This is false! You can write Rust code without lifetime annotations. Actually, clean Rust code looks very similar to TypeScript while empowering the developers a thousand times more. And I can prove it: All the code accompanying the book is available on GitHub: https://github.com/skerkour/black-hat-rust
This is why I dedicated the past months to write a book about the topic: Black Hat Rust - Applied offensive security with the Rust programming language.
-
Backdooring Rust crates for fun and profit
It's actually possible to inspect build.rs files on docs.rs by using the source view: https://docs.rs/crate/[CRATE]/[VERSION]/source/. Thanks Joshua 🙏
Want to learn more Rust, Offensive Security and Applied Cryptography? Take a look at my book Black Hat Rust Get 42% off until Friday, November 12 with the coupon 1311B892
-
Testing and building your Rust project with GitHub Actions
This post is an excerpt from my book Black Hat Rust
-
How to create small Docker images for Rust
If you want to learn more from real-world Rust experience, Security and Cryptography, I wrote a book where, among other things, we create and deploy a Rust service using Docker: Black Hat Rust.
-
Building a web application with Rust and WebAssembly
As usual, you can find the code on GitHub: github.com/skerkour/black-hat-rust (please don't forget to star the repo 🙏).
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
We haven't tracked posts mentioning CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
sn0int - Semi-automatic OSINT framework and package manager
zero-to-production - Code for "Zero To Production In Rust", a book on API development using Rust.
yakuza-freecam - Yakuza Freecam Tool made in Rust
dirble - Fast directory scanning and scraping tool
cve - Gather and update all available and newest CVEs with their PoC.
rust-windows-shellcode - Windows shellcode development in Rust
calibre - The official source code repository for the calibre ebook manager
book - The Rust Programming Language
RustScan - 🤖 The Modern Port Scanner 🤖
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
CVE-2021-44228-PoC-log4j-bypass-words - 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks