benfoxall / cursory-hack
☆88Updated 8 years ago
Alternatives and similar repositories for cursory-hack
Users that are interested in cursory-hack are comparing it to the libraries listed below
Sorting:
- Write JavaScript alert(1) with Katakana characters only☆144Updated 7 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 4 years ago
- Miscellaneous☆20Updated 6 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated last year
- Webkit uxss exploit (CVE-2017-7089)☆64Updated 7 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆76Updated 5 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 7 years ago
- Hooks in to interesting functions and helps reverse the web app faster.☆167Updated 3 months ago
- Safari local file reader☆122Updated 6 years ago
- Another web fuzzer written in NodeJS☆58Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- A framework for collecting and viewing graphical browser fingerprints.☆93Updated 10 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 9 years ago
- ☆29Updated 5 years ago
- Discussion area for security aspects of ECMAScript☆64Updated 7 years ago
- One-click utility to test race conditions☆165Updated 7 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆117Updated 12 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- timing attack to check if devtools are open☆52Updated 9 years ago
- TLS Redirection☆120Updated 7 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆55Updated 8 years ago
- Hunt for vulnerable websites as you browse.☆131Updated 8 years ago
- ☆61Updated 7 years ago
- Tool to help with the exploitation of web application race conditions☆182Updated 6 years ago
- A quick and easy way to test CSP behavior on modern browsers☆49Updated 6 years ago
- Fast browser-based network discovery module☆113Updated 3 years ago
- RegEx Denial of Service (ReDos) Scanner☆163Updated 7 years ago