jofpin / brashLinks
Chromium Browser DoS Attack via document.title Exploitation
☆167Updated 2 months ago
Alternatives and similar repositories for brash
Users that are interested in brash are comparing it to the libraries listed below
Sorting:
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 11 months ago
- A tool to dump exposed .git repositories☆73Updated 6 months ago
- the blazing-fast pentesting suite.☆277Updated 2 months ago
- Tool for reversing Google internal protobuf definitions☆158Updated 7 months ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆19Updated last year
- ROT26 encryption, twice as secure as ROT13☆58Updated 11 months ago
- Libraries supporting Discord's Audio & Video End-to-End Encryption (DAVE) protocol☆213Updated last week
- ☆151Updated this week
- PNG-ZIP / JAR polyglot tool.☆38Updated last week
- Example of CVE-2024-24576 use case.☆59Updated last year
- A fork of the Go language with some tweaks☆52Updated 11 months ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆193Updated 7 months ago
- Hides message with invisible Unicode characters☆96Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆145Updated last year
- reCAPTCHA lookalike widget☆57Updated 8 months ago
- Write any bash with only the punctuation characters☆83Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆74Updated 2 years ago
- A library for intercepting system calls☆103Updated 11 months ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆81Updated 2 years ago
- Crack Bash's $RANDOM variable to get the internal seed and predict future values, after only 2-3 samples☆24Updated last year
- ☆374Updated last month
- Artifacts for the ACM CCS 2025 paper "Pixnapping: Bringing Pixel Stealing out of the Stone Age"☆88Updated 3 months ago
- Whitepaper for Discord's Audio & Video End-to-End Encryption (DAVE) Protocol☆169Updated 4 months ago
- Tool for recovering the phone number tied to a Google account☆115Updated 6 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆29Updated last year
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆66Updated 4 months ago
- ☆136Updated last year
- Bluesky / AT Protocol vulnerability disclosures and exploit framework☆178Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated last year