dsasmblr / JavaScript-jQuery-and-TampermonkeyLinks
Collection of my own personal JavaScript/jQuery/Tampermonkey scripts!
☆23Updated 5 years ago
Alternatives and similar repositories for JavaScript-jQuery-and-Tampermonkey
Users that are interested in JavaScript-jQuery-and-Tampermonkey are comparing it to the libraries listed below
Sorting:
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆13Updated 3 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Updated 9 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆13Updated 8 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- research chrome stored databases - dumping all urls☆41Updated 7 years ago
- Python program that denies internet access to a target within a local network...☆24Updated 4 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- The server-side and client-side code powering BrowserAudit.com☆21Updated 3 weeks ago
- Hacking as per the book☆35Updated 6 years ago
- Discovering Facebook Graph Search - keywords and☆21Updated 7 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Updated 11 years ago
- ☆34Updated 3 years ago
- Javascript Unpacker and Simplifier☆41Updated 7 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆52Updated last year
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- WHY?☆18Updated 8 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆11Updated 10 years ago
- List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will fa…☆61Updated 8 years ago
- SSL man-in-the-middle tool targeting iOS devices < 4.3.5☆37Updated 14 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago