weizman / awesome-javascript-anti-debuggingLinks
javascript based browser anti debugging techniques resources
☆134Updated 2 weeks ago
Alternatives and similar repositories for awesome-javascript-anti-debugging
Users that are interested in awesome-javascript-anti-debugging are comparing it to the libraries listed below
Sorting:
- A web client port-scanner written in GO, that supports the WASM/WASI interface for Browser WebAssembly runtime execution.☆156Updated 2 years ago
- View8 - Decompiles serialized V8 objects back into high-level readable code.☆305Updated last year
- View8 - Decompiles serialized V8 objects back into high-level readable code.☆80Updated 6 months ago
- A Javascript Deobfuscator☆509Updated 2 weeks ago
- Electron Research☆72Updated 3 years ago
- IlluminateJS is a static JavaScript deobfuscator☆157Updated 2 years ago
- Generate DOM clobbering attack vectors for you.☆34Updated 6 months ago
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆187Updated 4 years ago
- A deobfuscator for JavaScript codes generated by Obfuscator.io☆191Updated last year
- Pure-JS bindings to control Frida from node.js & browsers☆41Updated 5 months ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆334Updated last year
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Updated 4 years ago
- Inti easter challenge poc☆18Updated 4 years ago
- Online Javascript Deobfuscator Tool☆147Updated 2 years ago
- Decompiler and reverse engineering tool for wasm binaries☆42Updated 11 months ago
- A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.☆94Updated last year
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆82Updated 6 years ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆34Updated 3 years ago
- CTF challenges I've written☆35Updated 2 years ago
- Playground☆56Updated last month
- A library of tools I assembled from various sources in preparation for the REDEYE hack night ctf☆49Updated 4 months ago
- A mini bytecode Interpreter for v8.☆23Updated 3 years ago
- List of Trusted Types bypasses☆102Updated last year
- reverse many of the transformations applied by minifiers and naïve obfuscators☆226Updated 3 years ago
- Unpack any pkg application☆107Updated 6 months ago
- Find all libraries on cdn.js that pollute your prototype☆19Updated 3 years ago
- A instrumented variant of the V8 JavaScript Engine☆228Updated this week
- Easily intercept and modify WebSocket requests and message events.☆254Updated 5 years ago
- ctf writeup and log☆48Updated last year
- A study of V8 internals.☆73Updated 5 years ago