Anonymous automation with fingerprint replacement technology.
-
Updated
Nov 4, 2025 - JavaScript
Anonymous automation with fingerprint replacement technology.
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
FrogPost: postMessage Security Testing Tool
Examples of security features (or mishaps) on web applications -- these are mostly examples and tutorials from the WASEC book.
CRLF Bug scanner for WebPentesters and Bugbounty Hunters
Secure login interface based on ReactJS and PHP API, designed with Material-UI. The PHP API server-side counts requests to the webserver - logs and blocks suspicious intruders.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
chrome bot detection based off each release version. Each version has new updates or old ways to detect browser bots
React and Express js communicator app
This repo serves the purpose of implementing session based authentication for modern-day web applications.
GuardLink is a powerful Chrome extension designed to protect users from navigating to potentially harmful websites. It reviews the security status of links before you visit them, detecting security vulnerabilities and identifying compromised sites. With GuardLink, you can browse the web
Red-byte is an educational pentesting tool that extracts sensitive data from web forms using hidden payloads embedded within images. It helps users understand phishing vulnerabilities and simulate attacks to enhance security awareness and practices.
A simple demonstration of SQL injection attack using node.js, express.js and SQL server database
Laboratorio para aprender y explotar la vulnerabilidad Cross-Site WebSocket Hijacking
Contains security vulnerabilities payloads and exploits that I come across or use
Explore and learn about JWT vulnerabilities through hands-on security labs. Perfect for cybersecurity enthusiasts, developers, and learners!
Add a description, image, and links to the websecurity topic page so that developers can more easily learn about it.
To associate your repository with the websecurity topic, visit your repo's landing page and select "manage topics."