yeswehack / Dom-ExplorerLinks
☆21Updated 5 months ago
Alternatives and similar repositories for Dom-Explorer
Users that are interested in Dom-Explorer are comparing it to the libraries listed below
Sorting:
- ☆26Updated 2 weeks ago
- Awesome MXSS ??☆50Updated 8 months ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆51Updated last month
- This repository is a one-stop shop for diving deep into the fascinating world of mXSS (mutations caused by browser quirks in HTML parsing…☆22Updated 3 months ago
- ☆81Updated 8 months ago
- A complete table of results of types comparison in multiple languages☆32Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆66Updated 2 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆20Updated 3 months ago
- Challenges I wrote for various CTF competitions☆43Updated 10 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆49Updated last year
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆51Updated last week
- ☠️ Code for the Defcon Workshop☆23Updated 10 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆93Updated 4 months ago
- Fast exfiltration of text using only CSS and Ligatures☆50Updated last month
- ☆33Updated 11 months ago
- HTML Universal Identifier☆64Updated 5 months ago
- Make better use of the embedded browser that comes by default with Burp☆42Updated last year
- ☆36Updated last month
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆26Updated last month
- Some tips for Bug Bounty using LibreOffice☆46Updated 3 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- List of Trusted Types bypasses☆93Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Updated 2 years ago
- A collection of pyjails!☆16Updated 2 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆163Updated 9 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 9 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- a repository of all the CTF challenges I've made for public events☆53Updated last year