schoenbergerb / noscrapeLinks
This repository is deprecated
☆41Updated last year
Alternatives and similar repositories for noscrape
Users that are interested in noscrape are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security☆11Updated last year
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆21Updated last year
- An exotic service bruteforce tool.☆14Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A utility to quickly map IP addresses to their respective ASN☆19Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated last year
- ☆12Updated 3 years ago
- Content-Security-Policy (CSP) Bypass Techniques☆63Updated 4 years ago
- A distributed network mapper/security scanner.☆16Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆13Updated 3 months ago
- An example of a vulnerability in the early JWT token node.js library☆37Updated 2 years ago
- Post-exploitation tool☆26Updated 4 years ago
- A Web Platform API proposal for Blob URL☆10Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆12Updated 3 months ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆34Updated 4 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆15Updated 4 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆66Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆22Updated 10 months ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆12Updated 8 months ago
- PAM Backdoor☆28Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- Site fast fuzzing with chorme extension.☆25Updated 3 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆17Updated 5 months ago
- A tool for bypass certify pinning in Android apps☆25Updated 5 years ago