Reconnaissance on browser using Javascript
☆30Feb 16, 2018Updated 8 years ago
Alternatives and similar repositories for JSrecon
Users that are interested in JSrecon are comparing it to the libraries listed below
Sorting:
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆14Apr 25, 2019Updated 6 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- zyxel_ipc_camera_pwn☆21Dec 31, 2022Updated 3 years ago
- Demonstrates how Android Marshmallow permissions dialog can be hijacked by the app drawind on top of it.☆27Jan 20, 2016Updated 10 years ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- ☆29Feb 24, 2021Updated 5 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- TVTestでCAS処理をするためのプラグイン☆30Feb 16, 2023Updated 3 years ago
- ISDB-S3 fork☆10Dec 13, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- ☆96Apr 3, 2025Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- [DEPRECATED] A general purpose http client built with extensibility in mind. It also features lifecycle hooks, dynamic hostname resolutio…☆12Sep 6, 2023Updated 2 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- A really dumb proof of concept that bundles the nightly branch builds of all of the *arr applications into a single container.☆15Updated this week
- CVE-2019-2729 Exploit Script☆46Feb 19, 2020Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- 無料で使える中品質なテキスト読み上げソフトウェア、VOICEVOXの音声合成エンジン☆10Jan 30, 2023Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- A collection of simple tools and poc-builders☆39Jul 22, 2025Updated 7 months ago
- ☆42Aug 24, 2025Updated 6 months ago
- XXE Out of Band Server.☆173Aug 9, 2023Updated 2 years ago
- Faster and cheaper! parallel processing of Anthropic API requests, optimizing for speed, cost-efficiency, and rate limit compliance.☆15Oct 1, 2024Updated last year
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆19Nov 4, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago