A curated list of awesome browser security learning material.
☆149Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-browser-security
Users that are interested in awesome-browser-security are comparing it to the libraries listed below
Sorting:
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Awesome information for WebSockets security research☆301Jan 10, 2022Updated 4 years ago
- ☆65May 21, 2024Updated last year
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- Simple Kernel Extension to read and write Kernel Memory☆15Aug 18, 2022Updated 3 years ago
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago
- ☆79Mar 24, 2023Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- A curated list of awesome iOS application security resources.☆633Jan 5, 2024Updated 2 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- awesome list of browser exploitation tutorials☆2,266Sep 18, 2023Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- ☆19Dec 9, 2022Updated 3 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- WebGL fuzzer☆39Mar 13, 2023Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated last month
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- A curated list of Awesome Security Challenges.☆211Nov 6, 2024Updated last year
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago