BenjaminAster / invisible-javascript
Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.
☆10Updated 4 months ago
Alternatives and similar repositories for invisible-javascript:
Users that are interested in invisible-javascript are comparing it to the libraries listed below
- A command based package for simple display of statistics☆21Updated 2 months ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 8 months ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆33Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- [Confluence] CVE-2023-22527 realworld poc☆18Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- FireProx written in Go☆19Updated 10 months ago
- Python script implementing the favicon hash trick to find subdomains.☆28Updated last year
- Return domains in CSP headers in http response☆15Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆39Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- ☆16Updated 7 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 6 months ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Updated last year
- masscan with exclusive excludes☆55Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆14Updated 2 months ago
- Ffuf output browser☆39Updated last year
- OSED Practice binary☆24Updated last year