BenjaminAster / invisible-javascriptLinks
Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.
☆17Updated last year
Alternatives and similar repositories for invisible-javascript
Users that are interested in invisible-javascript are comparing it to the libraries listed below
Sorting:
- whois command implemented by golang with awesome whois servers list☆65Updated 2 years ago
- A command based package for simple display of statistics☆25Updated 11 months ago
- Curated list of categorized User Agents☆102Updated 3 weeks ago
- masscan with exclusive excludes☆57Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- 🔗 A curated list of awesome Caido related projects☆44Updated 7 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆16Updated 6 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- PoC for CVE-2025-48384☆19Updated 3 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆29Updated last year
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆50Updated this week
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆35Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 10 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 11 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆59Updated last month
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago