adrgs / fontleakLinks
Fast exfiltration of text using only CSS and Ligatures
☆85Updated 2 months ago
Alternatives and similar repositories for fontleak
Users that are interested in fontleak are comparing it to the libraries listed below
Sorting:
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆115Updated 3 weeks ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆145Updated 7 months ago
- Useful configurations for the DomLogger++ extension☆43Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆181Updated last year
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆219Updated 4 months ago
- ☆119Updated last year
- jxscout superpowers JavaScript analysis for security researchers☆302Updated 2 months ago
- unleashed ffuf☆230Updated 3 weeks ago
- CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scr…☆501Updated 2 weeks ago
- Chrome extension for automating CSPT discovery☆119Updated 5 months ago
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆200Updated 5 months ago
- Awesome MXSS ??☆55Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆154Updated last year
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆74Updated 5 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆160Updated last month
- Some tips for Bug Bounty using LibreOffice☆53Updated 8 months ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆213Updated 9 months ago
- 🛠️ Workflows created by the community☆84Updated last month
- Self-hosted bug bounty programs that are "scammy" or unethical☆148Updated 3 weeks ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 11 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆285Updated last year
- ☆74Updated last year
- ☆183Updated last year
- A fancier postMessage tracker with Chrome Manifest version V3 support and a few additional features, inspired by Frans Rosens postmessage…☆103Updated 2 months ago
- ☆86Updated 4 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆144Updated last year
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆54Updated 4 months ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆53Updated 4 months ago
- This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains a…☆65Updated 10 months ago
- A cybersecurity challenge, based on a real world finding☆11Updated last year