☆15Mar 3, 2025Updated 11 months ago
Alternatives and similar repositories for JavaScript-for-Cyber-Security
Users that are interested in JavaScript-for-Cyber-Security are comparing it to the libraries listed below
Sorting:
- ☆18May 18, 2025Updated 9 months ago
- ☆18Jul 11, 2025Updated 7 months ago
- ☆25Feb 10, 2026Updated 2 weeks ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Feb 10, 2024Updated 2 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆11Dec 27, 2024Updated last year
- This is a framework for web penetration testers and web developers☆12Apr 15, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- Reverse Engineering 4 Fun & Profit☆25May 27, 2025Updated 9 months ago
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- MavLink Protocol Drone Exploiting Tool☆15Aug 24, 2024Updated last year
- Get acquisitions by scraping titles of crunchbase.☆15Dec 18, 2024Updated last year
- Android studio course -Source code of the tutorial Android studio in arabic which provided by engineer Shiyar Jamo on YouTube and Shiyar …☆22Dec 27, 2020Updated 5 years ago
- ☆16Sep 7, 2023Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- ExtPenPy is a tool that will help you finalizing your recon phase faster.☆17Dec 4, 2024Updated last year
- Guides, Courses, Writeups and Tools That May Be Useful for CTFs☆24Jan 8, 2021Updated 5 years ago
- Here you can find mostly all disclosed h1 reports☆17Apr 4, 2019Updated 6 years ago
- ☆16Nov 13, 2024Updated last year
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Dec 1, 2024Updated last year
- this repository made to help me All Dorking repositories find for one location☆35Aug 31, 2025Updated 6 months ago
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆24Apr 20, 2025Updated 10 months ago
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆92Feb 9, 2025Updated last year
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Aug 24, 2023Updated 2 years ago
- ☆19Nov 25, 2025Updated 3 months ago
- Lecture notes for EECS 575 (Advanced Cryptography), fall 2021, at the University of Michigan☆19Dec 1, 2021Updated 4 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- Projects for security students and professionals☆228Jul 5, 2024Updated last year
- This is the open source version of vulnerable.codes platform.☆28Apr 17, 2025Updated 10 months ago
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- ☆23Nov 28, 2024Updated last year
- Things we learned from Capture The Flag hacking competitions we participated in☆21Mar 15, 2021Updated 4 years ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆58Dec 21, 2025Updated 2 months ago
- Soc Reources Repo☆36Oct 22, 2024Updated last year
- A resources for who want to learn and get deep into client-side bugs☆422Dec 8, 2024Updated last year
- ☆26Feb 21, 2026Updated last week
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆34Sep 4, 2025Updated 5 months ago