A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.
☆42Jul 1, 2017Updated 8 years ago
Alternatives and similar repositories for unicode-hax
Users that are interested in unicode-hax are comparing it to the libraries listed below
Sorting:
- ☆10Aug 8, 2015Updated 10 years ago
- Unicode Security Guide☆120Oct 16, 2017Updated 8 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Generates random utf-8 strings for fuzz t�sting character encoding probl�ms☆11Aug 21, 2015Updated 10 years ago
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- Python script that can scan for xss vulnerabilities in websites, this script has many features like scanning for xss in headers using pro…☆14Oct 27, 2016Updated 9 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- The boilerplate for a new Journal site☆19Oct 15, 2019Updated 6 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- Cross platform GitHub Action to upload multiple assets to a release using Golang☆12Feb 6, 2026Updated 3 weeks ago
- ☆21Sep 25, 2018Updated 7 years ago
- ☆53Dec 3, 2025Updated 2 months ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆27Feb 19, 2026Updated last week
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Dec 15, 2019Updated 6 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Apr 22, 2018Updated 7 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Start building devices to connect to the Hubble Network☆15Updated this week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- ☆36Apr 29, 2025Updated 10 months ago