BenjaminAster / invisible-javascript
Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.
☆10Updated 5 months ago
Alternatives and similar repositories for invisible-javascript:
Users that are interested in invisible-javascript are comparing it to the libraries listed below
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- OSED Practice binary☆24Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A command based package for simple display of statistics☆22Updated 4 months ago
- PoC for CVE-2021-3129 (Laravel)☆13Updated 3 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- Custom Binary Ninja Themes☆12Updated last year
- ☆27Updated last year
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 9 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 8 months ago
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆30Updated 2 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆10Updated last year
- Advanced test for proxy & waf☆13Updated 6 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆33Updated 3 weeks ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆25Updated last week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Saves pages to Wayback machine☆13Updated 4 months ago