🔪Browser logic vulnerabilities
☆700Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for uxss-db
Users that are interested in uxss-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of JavaScript engine CVEs with PoCs☆2,316Sep 3, 2019Updated 6 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- awesome list of browser exploitation tutorials☆2,275Sep 18, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,486Oct 12, 2024Updated last year
- DOM fuzzer☆1,767Nov 26, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Javascript library for browser exploitation☆895Feb 12, 2019Updated 7 years ago
- Browser's XSS Filter Bypass Cheat Sheet☆1,152May 6, 2017Updated 8 years ago
- A JavaScript Engine Fuzzer☆2,175Updated this week
- The Harvest of V8 regress.☆137Jul 18, 2020Updated 5 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆861Jun 4, 2020Updated 5 years ago
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆223Mar 31, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Code-Audit-Challenges☆991Nov 17, 2018Updated 7 years ago
- ✍️ A curated list of CVE PoCs.☆3,490Jan 4, 2022Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,170May 26, 2023Updated 2 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 7 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆608May 17, 2019Updated 6 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- OpenSource My ImageMagick Fuzzer ..☆297Jul 26, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated 2 years ago
- Fuzzing Browsers☆317Dec 5, 2022Updated 3 years ago
- Vulnerability Labs for security analysis☆1,171Mar 10, 2021Updated 5 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- ☆463Oct 4, 2020Updated 5 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- ☆385Jan 12, 2024Updated 2 years ago
- A Pwn2Own exploit chain☆758Nov 8, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Jun 13, 2020Updated 5 years ago
- Collection of CTF Web challenges I made☆2,829Aug 31, 2025Updated 7 months ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆519Jul 29, 2020Updated 5 years ago
- some vul☆791Apr 25, 2025Updated 11 months ago
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,878Mar 12, 2021Updated 5 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year