Thank you for your interest in contributing to the ASCII Unicode Exploit Kit! This document provides guidelines for contributing to the project.
- Novel Unicode exploitation techniques
- Additional homoglyph mappings
- Cross-platform normalization quirks
- ML-system specific bypasses
- Enhanced analyzer heuristics
- New suspicious character patterns
- Script mixing detection
- Risk scoring refinements
- Additional output formats
- Performance optimizations
- New obfuscation techniques
- Integration with other security tools
- Technical write-ups
- Real-world case studies
- Mitigation strategies
- Educational materials
- Follow PEP 8
- Use type hints where possible
- Document all public functions
- Include docstrings with examples
- Add tests for new features
- Maintain >80% code coverage
- Test edge cases with Unicode
- Validate on Python 3.8+
type(scope): description
[optional body]
[optional footer]
Types: feat, fix, docs, style, refactor, test, chore
Example:
feat(unicode): add Cherokee homoglyphs
Add Cherokee letters that resemble Latin characters
to the homoglyph mapping dictionary.
Closes #123
When contributing research findings:
- Document the target system (if applicable)
- Provide reproducible examples
- Include mitigation strategies
- Follow responsible disclosure
# Run all tests
python tests/test_suite.py
# Test specific module
python -m pytest tests/test_suite.py::TestUnicodeGenerator -v
# Run with coverage
python -m pytest tests/ --cov=src --cov-report=html- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Make your changes
- Add tests for new functionality
- Update documentation
- Run the test suite
- Submit a pull request
- Code follows style guidelines
- Tests pass locally
- Documentation updated
- CHANGELOG.md updated
- Commit messages are clear
When reporting bugs, please include:
- Python version
- Operating system
- Minimal reproduction case
- Expected vs actual behavior
- Any error messages
Feature requests are welcome! Please:
- Check existing issues first
- Describe the use case
- Explain why current tools don't suffice
- Provide examples if possible
Contributors will be recognized in:
- README.md contributors section
- Release notes
- Project documentation
All contributions must adhere to our ethical use policy:
- Research-focused only
- No malicious exploitation tools
- Include defensive recommendations
- Follow responsible disclosure
- Open an issue for questions
- Email: [your-email]
- Blog: https://frankhacks.blogspot.com
13th Hour Research Division 🦀