☆33Apr 6, 2026Updated this week
Alternatives and similar repositories for browser-extension
Users that are interested in browser-extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔰 Caido Plugin StarterKit☆34Dec 7, 2024Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- ☆15Aug 25, 2023Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- zsh plugins for vivid☆12Aug 14, 2024Updated last year
- My Workspace dotfiles config .☆13Jun 30, 2021Updated 4 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆14Sep 23, 2022Updated 3 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 11 months ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Awesome-Cellular-Hacking☆11Jul 9, 2019Updated 6 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆33Jan 24, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- Well-unified zsh widgets for fzf☆38Jun 9, 2024Updated last year
- Emulation of application data in its original state.☆18Nov 19, 2022Updated 3 years ago
- ☆16Apr 19, 2022Updated 3 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆23Apr 1, 2026Updated last week
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35May 29, 2022Updated 3 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2py☆12Sep 3, 2019Updated 6 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- Website that lets you:- • Generate strong new passwords • Check the strength of your password and • Find the time it would take a hacker …☆12Mar 31, 2022Updated 4 years ago
- Some wrrite-ups☆18Feb 28, 2025Updated last year
- The only graphql wordlists you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆13Aug 18, 2023Updated 2 years ago
- ☆30Jun 30, 2025Updated 9 months ago
- Basically a regexp over a GitHub search.☆69Mar 28, 2023Updated 3 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Aug 9, 2022Updated 3 years ago
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- Hyde Themes☆19Feb 22, 2025Updated last year
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- A simple tool to convert socket5 proxy protocol to http proxy protocol☆15May 3, 2022Updated 3 years ago