cezary-sec / awesome-browser-securityView external linksLinks
A curated list of awesome browser security learning material.
☆148Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-browser-security
Users that are interested in awesome-browser-security are comparing it to the libraries listed below
Sorting:
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Awesome information for WebSockets security research☆300Jan 10, 2022Updated 4 years ago
- ☆65May 21, 2024Updated last year
- An updated collection of resources targeting browser-exploitation.☆825Mar 8, 2021Updated 4 years ago
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- oauth security guidelines☆230Jun 25, 2019Updated 6 years ago
- ☆79Mar 24, 2023Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- ☆35Apr 14, 2025Updated 10 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- A curated list of awesome iOS application security resources.☆628Jan 5, 2024Updated 2 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)☆15Oct 21, 2024Updated last year
- 2019年天融信阿尔法实验室在微信公众号发布的所有安全资讯汇总☆35Jan 11, 2021Updated 5 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- Collection of browser challenges☆139May 3, 2021Updated 4 years ago
- WebGL fuzzer☆39Mar 13, 2023Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 weeks ago
- A curated list of Awesome Security Challenges.☆211Nov 6, 2024Updated last year
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- ☆29Dec 26, 2025Updated last month
- Knowledge Report Alert & Normalization Generator☆26Updated this week