prototype-pollution-explained
Kaitai Struct
prototype-pollution-explained | Kaitai Struct | |
---|---|---|
3 | 44 | |
75 | 3,839 | |
- | 1.1% | |
0.0 | 7.5 | |
over 1 year ago | 18 days ago | |
JavaScript | Shell | |
- | GPL-3.0-or-later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
prototype-pollution-explained
-
Learning about ports and exploiting them
If you already know your NMAP command and switches, you can look up these sources to search what exploit to use depending on what port is open: - https://snyk.io/vuln/ - https://www.cvedetails.com/vulnerability-search.php - https://cve.mitre.org/cve/search_cve_list.html - https://nvd.nist.gov/vuln/search - https://www.rapid7.com/db/
-
Awesome Penetration Testing
Snyk Vulnerability DB - Detailed information and remediation guidance for vulnerabilities known by Snyk.
- Could someone please explain some to me how Prototype Pollution attack works with handlebars?
Kaitai Struct
- Reverse-engineering an encrypted IoT protocol
-
Parsing an Undocumented File Format
- ImHex [2], which has a pattern language [3] which allows parsing, and it seems more powerful than what Kaitai offers. I stumbled upon some limitations with it but it was still useful.
[1]: https://kaitai.io/
- Kaitai Struct – a declarative language used to describe binary data structures
-
HTTPie Desktop: cross-platform API testing client for humans
Beautiful. Didn't know something like this exists. Reminds me of Katai[0]
[0]. https://kaitai.io/
-
Hacking the LG Monitor's EDID
An EDID override like this would be helpful for macOS as well, where the monitors swapping around after standby is a real annoyance [0] [1]
EDID rewrites are 99% of the time blocked by the monitor firmware: https://notes.alinpanaitiu.com/Decoding-monitor-EDID-on-macO...
By the way, one helpful tool that helped me navigate the EDID dump was Kaitai Struct [2]. It shows a side by side view with the hex view and the EDID structure, and it highlights the hex values in real time as you navigate the structure. Unfortunately [3] it doesn't support the extension blocks that the author needs.
[0] https://notes.alinpanaitiu.com/Weird-monitor-bugs
[1] https://forums.macrumors.com/threads/external-displays-swapp...
[2] https://kaitai.io/
[3] https://github.com/kaitai-io/edid.ksy
- Kaitai Struct: new way to develop parsers for binary structures
-
Fq: Jq for Binary Formats
Kaitai Struct might be a good choice for that: https://kaitai.io/
-
Ingesting, parsing and making sense of device log data
For binary log format, there's the excellent Kaitai Struct frameworks, that make it very easy to generate parsers from a declarative schema
-
What is this tool? More info in comments
kaitai
-
Visual Programming with Elixir: Learning to Write Binary Parsers (2019)
https://kaitai.io/
Worth a look if you are writing binary parsers.
What are some alternatives?
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Protobuf - Protocol Buffers - Google's data interchange format
Cppcheck - static analysis of C/C++ code
csvkit - A suite of utilities for converting to and working with CSV, the king of tabular file formats.
Metasploit - Metasploit Framework
Camelot - A Python library to extract tabular data from PDFs
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
tablib - Python Module for Tabular Datasets in XLS, CSV, JSON, YAML, &c.
PDFMiner - Python PDF Parser (Not actively maintained). Check out pdfminer.six.
PyYAML
rizin - UNIX-like reverse engineering framework and command-line toolset.
Scopt - command line options parsing for Scala