This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks
☆19Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for PastePurify
Users that are interested in PastePurify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically exported from code.google.com/p/mustache-security☆23Mar 16, 2015Updated 11 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆13Oct 30, 2024Updated last year
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- Tabnabbing demo.☆17Feb 28, 2015Updated 11 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Find potential XSS vulnerabilities☆26Dec 6, 2021Updated 4 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Official CTF for 44CON 2019☆17Jul 22, 2023Updated 2 years ago
- Triplestore wrapper for HTML5 WebStorage☆22Dec 23, 2015Updated 10 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- x86 emulator written in Rust. Just for study☆10Jul 30, 2016Updated 9 years ago
- Ease-of-use extension for Web Application penetration testing☆23Jun 20, 2017Updated 8 years ago
- A SATySFi package to build simple tables.☆17Apr 30, 2022Updated 3 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- ☆12May 9, 2017Updated 8 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Parallel GDB developed for debugging HPC code at Lawrence Livermore National Laboratory.☆32Nov 3, 2015Updated 10 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆25Jun 28, 2020Updated 5 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- This is a simple app demonstrating how to use RethinkDB in a Phoenix application☆10Jan 6, 2016Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- lightweight japanese ime written in rust☆18Mar 23, 2023Updated 3 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- ☆86Jul 27, 2022Updated 3 years ago
- Bundle your JS with browserify with preconfigured transforms☆14Aug 19, 2019Updated 6 years ago
- Open Sigfox Stack - Specifications☆14Jul 31, 2020Updated 5 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Tiny message bus☆13Mar 3, 2017Updated 9 years ago