Runroom / purejsLinks
Common javascript functions without jquery
☆16Updated 7 months ago
Alternatives and similar repositories for purejs
Users that are interested in purejs are comparing it to the libraries listed below
Sorting:
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Updated 8 years ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- A repository documenting Access control readers and technology☆11Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Ultimaker 2/2+ firmware with extruder fan control + interposer board☆10Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 4 years ago
- Learning about disassembling☆20Updated 5 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Binary Explorer is a simple CPLD board used in various digital circuit labs.☆10Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers☆16Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Updated last year
- Crash Royale Attack Kit☆40Updated 6 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Mirror of lascar (https://github.com/Ledger-Donjon/lascar)☆14Updated 6 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Updated 5 years ago
- Binary matching with Binary Ninja☆21Updated 11 months ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- The official command line client for IPFinder☆11Updated 6 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- Tor relay certificate downloader☆11Updated 8 years ago