Stars
4
Forks
2
Language
HTML
Last Updated
Feb 11, 2021
Similar Repos
Repo | Language | Stars | Description | Updated At |
---|---|---|---|---|
JavaScript | 2658 | HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors | Aug 09, 2022 | |
JavaScript | 3 | HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors | Mar 01, 2023 | |
None | 770 | Comprehensive list of known attack vectors and common anti-patterns | Aug 11, 2022 | |
None | 2 | Comprehensive list of known attack vectors and common anti-patterns | Aug 17, 2018 | |
None | 18 | Web attack vectors collection | Sep 12, 2022 | |
PHP | 39 | Examples of common attack vectors and defenses against the drupalgeddon SQL injection vulnerability | Nov 21, 2022 | |
Svelte | 2 | definitions for common (and uncommon) furry terms | Dec 19, 2022 | |
Nim | 8 | Common and uncommon statistical functions for Nim. | Apr 07, 2021 | |
None | 9 | A collection of XSS Attack vectors | Mar 01, 2023 | |
HTML | 25 | A collection of cybersecurity attack vectors | May 22, 2023 | |
None | 2 | A collection of cybersecurity attack vectors | Oct 22, 2022 | |
None | 98 | Glossary of Gradle terms both common and uncommon | Jul 07, 2022 | |
HTML | 18 | Generate DOM clobbering attack vectors for you. | Sep 02, 2022 | |
None | 2 | Exotic and uncommon XSS Vectors to hit the target as quickly as possible. | Mar 30, 2023 | |
None | 22 | This Repository contains list of Common NFT Attack Vectors. If you find any attack vectors … | Apr 30, 2023 | |
None | 214 | This Repository contains list of Common Solidity SmartContract Attack Vectors. If you find any attack … | Apr 30, 2023 | |
Jupyter Notebook | 2 | Quantifying families of attack vectors on DAO structures | Feb 12, 2022 | |
None | 380 | A curated list of smart contract attack vectors | May 06, 2023 | |
None | 20 | This Repository contains list of Common Blockchain threats and Attack Vectors. If you find any … | Mar 07, 2023 | |
None | 28 | This Repository contains list of Common DeFi threat and Attack Vectors. If you find any … | Apr 30, 2023 | |
PHP | 10 | Tasty TADS 3 recipes for solving common and uncommon problems. | Jan 13, 2023 | |
C# | 2 | List of common and uncommon Sorting Algorithms at your disposal | Nov 23, 2022 | |
HTML | 10 | Relay Recipes - Recipes for doing common (and uncommon) things in Relay. | May 23, 2020 | |
C++ | 2 | templates for openFrameworks wrapping common and uncommon routines for audio & video | Mar 31, 2021 | |
Jupyter Notebook | 4 | A dataset of images of objects in both common and uncommon settings | Sep 05, 2022 | |
Common Lisp | 252 | Common Lisp HTML5 generator | May 19, 2023 | |
Go | 18 | Uncommon Printing System | Oct 18, 2022 | |
Python | 5 | Updated common web attack threat dataset | Mar 12, 2023 | |
R | 24 | Common Classes and Data Structures for Geometry Vectors | Aug 15, 2020 | |
HTML | 385 | A repository to monitor attack vectors from state-backed information operations | Apr 24, 2022 | |
None | 502 | A collection of smart contract attack vectors along with prevention methods. | Aug 28, 2022 | |
None | 3 | A repository to monitor attack vectors from state-backed information operations | Apr 09, 2023 | |
None | 6 | A collection of smart contract attack vectors along with prevention methods. | Apr 09, 2023 | |
None | 2 | Previous failed attempts have led us to vary our attack vectors. | Feb 15, 2017 | |
Java | 12 | Uses the attack indicator for more than just melee attacks | Mar 10, 2023 | |
JavaScript | 42 | HTML5 Training material for Attack and Secure training sessions. | Apr 06, 2023 | |
Shell | 19 | Identify common attack paths to get Domain Administrator | Oct 25, 2022 | |
Python | 28 | :hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho: | Feb 20, 2023 | |
JavaScript | 3 | An uncommon date input plugin | May 11, 2023 | |
C# | 4 | A toolset designed for attacks against common password managers. | Sep 17, 2019 | |
Python | 3 | Understanding Common Factor Attacks: An RSA-Cracking Puzzle .... solution | Dec 23, 2020 | |
Python | 5 | A python tool which uses the Linux kernel's USB authorization support to lockdown USB devices … | Feb 17, 2023 | |
C++ | 26 | GPU code for the first SHA-1 collision attack and two freestart attacks | Apr 12, 2023 | |
None | 2 | Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks | Jun 16, 2022 | |
C | 253 | Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks | Apr 26, 2023 | |
Python | 5 | Generate Nepali Common Wordslists for dictionary attacks and legal pentests. | Jan 15, 2022 | |
Solidity | 2 | A collection of Smart Contracts depicting common attacks in Solidity | May 02, 2023 | |
Makefile | 2 | A curiously uncommon build framework... 🧐 | Oct 21, 2023 | |
JavaScript | 114 | Demo of phishing attack on the native HTML5 full screen API. | Dec 05, 2022 | |
Python | 4 | A Windows/Linux console application used to attack bug bounty target with various attacks. | May 13, 2023 |