β32Mar 16, 2026Updated this week
Alternatives and similar repositories for browser-extension
Users that are interested in browser-extension are comparing it to the libraries listed below
Sorting:
- π° Caido Plugin StarterKitβ34Dec 7, 2024Updated last year
- ZAP Adminβ31Updated this week
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on itβ13Mar 5, 2021Updated 5 years ago
- β15Aug 25, 2023Updated 2 years ago
- β11Oct 30, 2024Updated last year
- Everything about xss protection technologyβ14Oct 22, 2019Updated 6 years ago
- zsh plugins for vividβ12Aug 14, 2024Updated last year
- Bypass 4xx HTTP response status codes and more. Based on PycURL.β16Jun 27, 2022Updated 3 years ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ14Sep 23, 2022Updated 3 years ago
- Passive Web Vulnerability Detection Toolβ37May 5, 2025Updated 10 months ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be aβ¦β18May 17, 2020Updated 5 years ago
- Awesome-Cellular-Hackingβ11Jul 9, 2019Updated 6 years ago
- GitHub Pagesβ14Nov 24, 2025Updated 3 months ago
- An AI-powered assistant for hackers and security professionals built for Caidoβ31Jan 24, 2026Updated last month
- A bitmap programming font optimized for coziness πβ10Jan 11, 2026Updated 2 months ago
- β16Apr 19, 2022Updated 3 years ago
- How to hack webcamsβ10Jan 7, 2022Updated 4 years ago
- Database interaction layer to store the Open Asset Model in a database management systemβ22Updated this week
- Automated Mass Exploiterβ11Apr 14, 2019Updated 6 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scannerβ16Nov 10, 2024Updated last year
- Identify the different types of hashes used to encrypt passwords.β10Mar 12, 2017Updated 9 years ago
- An improvement and a different approach to Mockingjay Self-Injection.β35May 21, 2024Updated last year
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2pyβ12Sep 3, 2019Updated 6 years ago
- My fuzz repo!β22Jul 28, 2023Updated 2 years ago
- Website that lets you:- β’ Generate strong new passwords β’ Check the strength of your password and β’ Find the time it would take a hacker β¦β12Mar 31, 2022Updated 3 years ago
- An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.β17Dec 31, 2021Updated 4 years ago
- The only graphql wordlists you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.β13Aug 18, 2023Updated 2 years ago
- β30Jun 30, 2025Updated 8 months ago
- Directory of lenses for Spyglass (https://github.com/spyglass-search/spyglass)β25Sep 18, 2023Updated 2 years ago
- Basically a regexp over a GitHub search.β69Mar 28, 2023Updated 2 years ago
- a script that is fairly reliable for web OSINTβ12Jul 20, 2021Updated 4 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binaryβ36Aug 9, 2022Updated 3 years ago
- huntr.dev public disclosures/hacktivity watcherβ17Nov 5, 2023Updated 2 years ago
- β45Mar 11, 2026Updated last week
- Download images from URLs within a CSVβ13Jan 6, 2021Updated 5 years ago
- A simple tool to convert socket5 proxy protocol to http proxy protocolβ15May 3, 2022Updated 3 years ago
- HTTP requests of FrontPage expolitβ25Dec 19, 2013Updated 12 years ago
- In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed atβ¦β15Apr 27, 2023Updated 2 years ago
- Wireshark dissector for the Nix daemon protocol.β14Sep 11, 2025Updated 6 months ago