schoenbergerb / noscrapeLinks
This repository is deprecated
☆42Updated last year
Alternatives and similar repositories for noscrape
Users that are interested in noscrape are comparing it to the libraries listed below
Sorting:
- A way to use fonts to obfuscate text.☆48Updated 2 years ago
- A tool to dump exposed .git repositories☆72Updated 5 months ago
- A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Bro…☆46Updated 3 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 11 months ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆17Updated last year
- Speeding up identifying which binaries with a SUID flag may lead to root access☆13Updated last year
- HTTP3-attacks (CVE-2022-30592)☆79Updated 2 years ago
- A web client port-scanner written in GO, that supports the WASM/WASI interface for Browser WebAssembly runtime execution.☆157Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Proof of concept for DoS exploit☆54Updated 2 years ago
- l9explore - Digs the dirt☆122Updated 2 months ago
- a smart DNS response-guided subdomain fuzzer☆157Updated 2 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆97Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆133Updated last year
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆51Updated 8 months ago
- A tool for scraping, dumping and unpacking (webpacked) javascript source files.☆162Updated 4 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆333Updated last year
- A container-based framework to enable the integration of mobile components in security training platforms☆182Updated 3 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆19Updated 9 months ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆130Updated 2 weeks ago
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Updated 3 years ago
- javascript based browser anti debugging techniques resources☆133Updated 2 years ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Updated last year
- ☆262Updated 3 years ago
- Windows And Ways To Break It☆101Updated 2 years ago
- Top 17 million most popular domains as CSV (from Google CRUX dataset)☆32Updated last year
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆42Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago