Skip to content
View OscarBataille's full-sized avatar

Block or report OscarBataille

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. CVE-2025-26794 CVE-2025-26794 Public

    CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup

    Python 11

  2. Fast-DKIM-Scanner Fast-DKIM-Scanner Public

    High-performance bruteforcer of DKIM selectors

    Python 3

  3. RepATT RepATT Public

    Detect emails vulnerable to partial DKIM replay-attacks

    Python 1

  4. Bostadeur Bostadeur Public

    PHP CLI Framework to aggregate available appartments from different sources and notify by SMS with the Twilio API.

    PHP 2

  5. SQL injection in SQLite3 with Double... SQL injection in SQLite3 with Double-quoted String Literals Or Why PHP's SQLite3::escapeString() is not safe.
    1
    ## SQL injection in SQLite3 with Double-quoted String Literals Or why PHP's SQLite3::escapeString() may not be safe
    2
    
                  
    3
    Applications relying on outdated-but-valid Double-quoted String Literals in their SQLite queries may be vulnerable to SQL injection if the escape function is designed for Single-quoted String Literals. \
    4
    PHP's [SQLite3::escapeString()](https://www.php.net/manual/en/sqlite3.escapestring.php) is one of these escape functions.
    5
    
                  
  6. Exim-SRS-poisoning Exim-SRS-poisoning Public

    Tool to turn an Exim relay into an open relay by bruteforcing the SRS hashes

    Python