BenjaminAster / invisible-javascriptLinks
Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.
☆17Updated 11 months ago
Alternatives and similar repositories for invisible-javascript
Users that are interested in invisible-javascript are comparing it to the libraries listed below
Sorting:
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆34Updated last year
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated 11 months ago
- masscan with exclusive excludes☆58Updated last year
- A command based package for simple display of statistics☆25Updated 9 months ago
- 🔗 A curated list of awesome Caido related projects☆44Updated 5 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- A tool to dump exposed .git repositories☆72Updated 3 months ago
- Curated list of categorized User Agents☆100Updated 2 weeks ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Advanced test for proxy & waf☆13Updated last week
- Custom Binary Ninja Themes☆12Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- PoC for CVE-2025-48384☆19Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆36Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated last year
- Manage attack surface data on Elasticsearch☆23Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 3 months ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 2 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆27Updated 2 years ago
- Saves pages to Wayback machine☆13Updated 9 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆17Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated last year