Companion repository of the "Dancer in the Dark" paper.
☆20Jul 13, 2024Updated last year
Alternatives and similar repositories for bxss
Users that are interested in bxss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 3 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- A Windows and Office KMS Enabler.☆12Oct 13, 2025Updated 5 months ago
- ☆17Sep 4, 2023Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Log4j_dos_CVE-2021-45105☆13Dec 19, 2021Updated 4 years ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- YuraScanner☆73Feb 13, 2025Updated last year
- ☆17May 29, 2018Updated 7 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- Simple PoC package for testing for dependency confusion vulnerabilities.☆10Feb 9, 2021Updated 5 years ago
- ☆21Mar 17, 2023Updated 3 years ago
- Official repository for ResolverFuzz☆18Aug 11, 2024Updated last year
- Real time narrateyour life☆18Jul 15, 2024Updated last year
- ☆22Nov 3, 2022Updated 3 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Jun 22, 2017Updated 8 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- {{关注我的个人微信公众号:Cydiapple}} => Cydia插件 Logos语言 开发Tweak.xm Cydia Substrate 注入dylib iOS逆向工程开发 越狱Jailbreak deb插件开发 - Frida / iOSOpenDev / Cycr…☆12Jul 29, 2025Updated 7 months ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆26Dec 7, 2021Updated 4 years ago
- This project was initially developed with my classmate for a school course, but as we grew more enthusiastic about it, we decided to cont…☆23Jun 21, 2024Updated last year
- ☆20Aug 8, 2023Updated 2 years ago
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆25Jun 11, 2024Updated last year
- ☆29Sep 27, 2020Updated 5 years ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆47Jun 19, 2025Updated 9 months ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- ☆27Dec 20, 2022Updated 3 years ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆20Aug 31, 2023Updated 2 years ago
- ☆18Nov 6, 2024Updated last year
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆75Jan 21, 2024Updated 2 years ago
- VASP is a framework to simulate attacks on V2X networks. It works on top of the VEINS simulator.☆26Mar 28, 2023Updated 2 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- Topic: The Swiss Army Knife of Java Exploitation☆21Feb 25, 2025Updated last year