Scan for vulnerabilities in JavaScript libraries you use (Python port of retirejs)
☆52Feb 6, 2020Updated 6 years ago
Alternatives and similar repositories for retirejslib
Users that are interested in retirejslib are comparing it to the libraries listed below
Sorting:
- Verify ownership of domains and mobile apps☆23May 22, 2023Updated 2 years ago
- ☆21May 6, 2019Updated 6 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆21Feb 15, 2021Updated 5 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20Mar 1, 2026Updated 2 weeks ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 6 months ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- ☆13May 30, 2017Updated 8 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- ☆102May 5, 2020Updated 5 years ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 9 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- Maven Infrastructure using Docker☆16Mar 5, 2026Updated 2 weeks ago
- A single WebTorrent client shared by all web pages and workers☆33Aug 19, 2022Updated 3 years ago
- Detect exposed API keys on GitHub commits.☆35Jul 27, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Your best is still an idiot.☆10Sep 24, 2021Updated 4 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Online test is available 👉☆11Feb 20, 2026Updated last month
- Generates a single, PGP signed web page from multiple source files.☆11Aug 24, 2016Updated 9 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,102Jan 3, 2026Updated 2 months ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆177Oct 12, 2021Updated 4 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- My rice/setup in Termux, the Android terminal emulator. Also compatible with iSH, the iOS terminal emulator.☆10Mar 24, 2023Updated 2 years ago