TheHulk is a dynamic analysis tool designed to detect and exploit DOM Clobbering vulnerabilities.
☆91Aug 25, 2025Updated 7 months ago
Alternatives and similar repositories for TheHulk
Users that are interested in TheHulk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of client-side libraries with HTML injection vulnerabilities and DOM clobbering gadgets.☆49Aug 31, 2025Updated 7 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆57Oct 25, 2023Updated 2 years ago
- ☆14Feb 11, 2023Updated 3 years ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆61Dec 18, 2025Updated 3 months ago
- Awesome MXSS ??☆56Sep 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆16Jul 17, 2024Updated last year
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Mar 20, 2026Updated 3 weeks ago
- This repository contains a number of insecure self-hosted applications that allows interested security engineers to test vulnerabilities …☆26Apr 30, 2025Updated 11 months ago
- A web browser with dynamic data-flow tracking enabled in the Javascript engine and DOM, based on Mozilla Firefox (https://github.com/mozi…☆165Mar 30, 2026Updated 2 weeks ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- ☆16Feb 27, 2026Updated last month
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆45Sep 22, 2024Updated last year
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Dec 2, 2018Updated 7 years ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆68Feb 28, 2025Updated last year
- XS-Leak Browser Test Suite☆86Dec 19, 2023Updated 2 years ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆28Apr 30, 2025Updated 11 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- Blazing fast CTF platform from the future. This is a GitHub mirror of the GitLab repository (https://gitlab.com/Milkdrop/ctfx)☆16Oct 27, 2023Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Caido plugin for jxscout☆15Nov 22, 2025Updated 4 months ago
- ai-based domain name generation☆137Feb 3, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Self-hosted bug bounty programs that are "scammy" or unethical☆173Feb 10, 2026Updated 2 months ago
- ☆180Oct 15, 2024Updated last year
- Differential testing framework for HTTP implementations☆928Jan 21, 2026Updated 2 months ago
- My mobile writeups repository☆29Nov 19, 2025Updated 4 months ago
- ☆31May 1, 2025Updated 11 months ago
- Burp插件,转发处理☆14Jan 17, 2023Updated 3 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆298Oct 5, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆40Sep 21, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Discovered Data and Source Code☆10May 5, 2025Updated 11 months ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated 2 months ago
- Automated JavaScript Debugging Tool using CDP - Automatically sets breakpoints for specified strings/patterns in JavaScript code☆95Dec 22, 2024Updated last year
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆74Jan 21, 2024Updated 2 years ago