Runroom / purejs
Common javascript functions without jquery
☆16Updated 2 months ago
Alternatives and similar repositories for purejs:
Users that are interested in purejs are comparing it to the libraries listed below
- A list of backdoor samples I find online.☆13Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Secure Boot Definition Languag☆10Updated 2 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- Platform independent Near Field Communication (NFC) library☆29Updated 4 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆13Updated 7 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- Detect whether a site is running behind Cloudflare.☆24Updated 7 months ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Guidelines for Security Disclosures☆25Updated 5 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Updated 8 years ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆27Updated 5 years ago
- My blog where I make a new coding project every Thursday.☆44Updated last year
- A repository of CAD files for 3D printable optical components.☆19Updated 7 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Open Source CNC-based Face Shield for protecting medical personnel☆11Updated 4 years ago
- A library & tool for probing, parsing, and validating security.txt files as specified in RFC 9116☆13Updated 9 months ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Node.js Module for parsing .pcapng files and tcpdump output.☆15Updated last year
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago