Companion repository of the "Dancer in the Dark" paper.
☆19Jul 13, 2024Updated last year
Alternatives and similar repositories for bxss
Users that are interested in bxss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 3 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 7 months ago
- A Windows and Office KMS Enabler.☆12Oct 13, 2025Updated 6 months ago
- ☆18Sep 4, 2023Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- A tool for monitoring bug bounty programs across multiple platforms to track scope changes.☆32Updated this week
- Log4j_dos_CVE-2021-45105☆13Dec 19, 2021Updated 4 years ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- YuraScanner☆76Feb 13, 2025Updated last year
- ☆17May 29, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆18Aug 9, 2024Updated last year
- ☆21Mar 17, 2023Updated 3 years ago
- Official repository for ResolverFuzz☆20Aug 11, 2024Updated last year
- ☆22Nov 3, 2022Updated 3 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Jun 22, 2017Updated 8 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Dec 7, 2021Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This project was initially developed with my classmate for a school course, but as we grew more enthusiastic about it, we decided to cont…☆23Jun 21, 2024Updated last year
- ☆20Aug 8, 2023Updated 2 years ago
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆25Jun 11, 2024Updated last year
- ☆29Sep 27, 2020Updated 5 years ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆48Jun 19, 2025Updated 9 months ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 4 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆74Jan 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- VASP is a framework to simulate attacks on V2X networks. It works on top of the VEINS simulator.☆26Mar 28, 2023Updated 3 years ago
- Topic: The Swiss Army Knife of Java Exploitation☆21Feb 25, 2025Updated last year
- RF Engineering Tool: Smith Chart Plotting and Matching Program☆14Jan 13, 2018Updated 8 years ago
- Official implementation of the WASP web agent security benchmark☆80Aug 12, 2025Updated 8 months ago
- ☆34Sep 19, 2022Updated 3 years ago
- ☆20Jan 19, 2026Updated 2 months ago