jofpin / brashLinks
Chromium Browser DoS Attack via document.title Exploitation
☆169Updated 2 months ago
Alternatives and similar repositories for brash
Users that are interested in brash are comparing it to the libraries listed below
Sorting:
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 11 months ago
- A tool to dump exposed .git repositories☆74Updated 7 months ago
- ROT26 encryption, twice as secure as ROT13☆58Updated last year
- A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Bro…☆48Updated 3 years ago
- Example of CVE-2024-24576 use case.☆59Updated last year
- Tool for reversing Google internal protobuf definitions☆163Updated 7 months ago
- Libraries supporting Discord's Audio & Video End-to-End Encryption (DAVE) protocol☆217Updated this week
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆193Updated 8 months ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆81Updated 2 years ago
- A javascript Library for leaking memory☆85Updated 2 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- the blazing-fast pentesting suite.☆310Updated last week
- A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.☆97Updated last year
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆18Updated last year
- Hides message with invisible Unicode characters☆95Updated last year
- PNG-ZIP / JAR polyglot tool.☆39Updated 2 weeks ago
- ☆907Updated 3 weeks ago
- Tool for recovering the phone number tied to a Google account☆116Updated 7 months ago
- Ridiculously fast web & TCP fuzzer designed for brute-forcing directories, subdomains, and files on web servers.☆129Updated 4 months ago
- ☆232Updated last year
- A way to use fonts to obfuscate text.☆50Updated 3 years ago
- Crack Bash's $RANDOM variable to get the internal seed and predict future values, after only 2-3 samples☆24Updated last year
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Updated 2 years ago
- Estimate how long it takes to read a text☆12Updated 4 months ago
- Artifacts for the ACM CCS 2025 paper "Pixnapping: Bringing Pixel Stealing out of the Stone Age"☆90Updated 4 months ago
- Manjaro LPE☆34Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Using Discord as a C2 - Proof of Concept☆61Updated 3 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆32Updated last year
- PasteBomb C2-less RAT☆318Updated 3 months ago