abdulkadir-gungor / HtmlSmuggling

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF

Date Created 2022-06-20 (2 years ago)
Commits 5 (last one 2 years ago)
Stargazers 106 (0 this week)
Watchers 3 (0 this week)
Forks 20
License other
Ranking

RepositoryStats indexes 566,921 repositories, of these abdulkadir-gungor/HtmlSmuggling is ranked #275,155 (51st percentile) for total stargazers, and #414,626 for total watchers. Github reports the primary language for this repository as Python, for repositories using this language it is ranked #50,340/111,699.

abdulkadir-gungor/HtmlSmuggling is also tagged with popular topics, for these it's ranked: javascript (#8,328/13493),  html (#1,484/2656),  cybersecurity (#531/905),  malware-research (#94/160),  cyber-security (#90/149),  ethical-hacking (#67/131)

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

5 commits on the default branch (main) since jan '22

Yearly Commits

Commits to the default branch (main) per year

Issue History

No issues have been posted

Languages

The primary language is Python but there's also others...

updated: 2024-10-05 @ 01:10am, id: 505384557 / R_kgDOHh-ObQ