A pattern for reasonably secure Electron applications
☆73Feb 4, 2023Updated 3 years ago
Alternatives and similar repositories for reasonably-secure-electron
Users that are interested in reasonably-secure-electron are comparing it to the libraries listed below
Sorting:
- TypeScript/JavaScript client libraries for Sliver☆24Updated this week
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated last month
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Burp with Friends☆103Jan 21, 2023Updated 3 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- Exposing the UN/CEFACT vocabulary as web semantics☆13Sep 13, 2024Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- ☆47Nov 13, 2021Updated 4 years ago
- ☆11Aug 17, 2023Updated 2 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- A GeoDjango app to return Cascadia quake risk and resilience factors based on location☆12Updated this week
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 3 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- Github Artifacts server example☆12Jun 4, 2021Updated 4 years ago
- ☆17Sep 14, 2022Updated 3 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated 2 weeks ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆47Aug 20, 2025Updated 6 months ago
- ☆19Jan 31, 2025Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Mar 4, 2025Updated last year
- ☆11Nov 20, 2024Updated last year
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆68Jul 19, 2022Updated 3 years ago
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets and…☆41Oct 4, 2025Updated 5 months ago
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Transform SBOM contents into a formatted document including markdown and PDF formats☆38Jan 26, 2026Updated last month
- Mpcurses is an abstraction of the Python curses and multiprocessing libraries providing function execution and runtime visualization capa…☆17Jan 4, 2025Updated last year
- ☆15Sep 12, 2018Updated 7 years ago
- ☆15Aug 6, 2021Updated 4 years ago
- Tiny browser for JSON APIs, especially ActivityPub☆17Feb 1, 2023Updated 3 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Device Identifier Composition Engine☆19Mar 15, 2022Updated 3 years ago