Companion repository of the "Dancer in the Dark" paper.
☆20Jul 13, 2024Updated last year
Alternatives and similar repositories for bxss
Users that are interested in bxss are comparing it to the libraries listed below
Sorting:
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- ☆17May 29, 2018Updated 7 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- ☆20Aug 8, 2023Updated 2 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆75Jan 21, 2024Updated 2 years ago
- Automated JavaScript Debugging Tool using CDP - Automatically sets breakpoints for specified strings/patterns in JavaScript code☆96Dec 22, 2024Updated last year
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- ☆34Sep 19, 2022Updated 3 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- Use java instrument API without JAR file☆47Jun 19, 2022Updated 3 years ago
- springboot getRequestURI acl bypass☆37Oct 13, 2020Updated 5 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- A Windows and Office KMS Enabler.☆12Oct 13, 2025Updated 4 months ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆36Oct 6, 2025Updated 4 months ago
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 7 months ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- ☆11Mar 5, 2023Updated 2 years ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆26Dec 25, 2025Updated 2 months ago
- 设置指定应用抓包 Xposed 插件☆14May 20, 2022Updated 3 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- AI-powered security code analysis and vulnerability scanner built with modern AI models and OWASP best practices.☆29Jul 6, 2025Updated 7 months ago
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- ☆11Nov 12, 2019Updated 6 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- A web-based linux-bash terminal☆10Feb 26, 2020Updated 6 years ago
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆12Jun 5, 2025Updated 8 months ago
- YuraScanner☆73Feb 13, 2025Updated last year
- CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC☆87Dec 15, 2022Updated 3 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆23Jan 23, 2026Updated last month
- Convert curl commands to Python code in your browser☆11Apr 6, 2017Updated 8 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago