A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.
☆49Feb 6, 2026Updated last month
Alternatives and similar repositories for js-vuln-studies
Users that are interested in js-vuln-studies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 3 months ago
- ☆16Feb 27, 2026Updated last month
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆73Feb 15, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- ☆44Updated this week
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- ☆12Aug 3, 2025Updated 7 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- Use claude code anywhere.☆55Feb 12, 2026Updated last month
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- Whitenoise CTF I: Doves in the Wind☆20Oct 11, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Oct 25, 2021Updated 4 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 3 weeks ago
- Linux & Android Kernel Vulnerability research and exploitation☆62Dec 12, 2023Updated 2 years ago
- Analysis of CVE-2025-43529 (WebKit UAF) + CVE-2025-14174 (ANGLE OOB) exploit chain - iOS Safari☆93Updated this week
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆96Feb 22, 2026Updated last month
- web ctf edu challs☆12Oct 15, 2023Updated 2 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆16Oct 16, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MB-X.01 · Logical Origin Node (L.O.N.) — TruthΩ → Co⁺ → Score⁺. Demo e spec verificabili. https://massimiliano.neocities.org/☆68Updated this week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 12 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- Convert your HackerOne reports into reusable AI skills.☆73Mar 9, 2026Updated 2 weeks ago
- ☆21Jul 2, 2024Updated last year
- Burpsuite Extension for Jsmon☆23Updated this week
- Scripts and package lists used to build image files on voidbuilds.xyz☆10Mar 20, 2024Updated 2 years ago