- Sweden
Block or Report
Block or report gnebbia
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language: JavaScript
Sort by: Most stars
Set up a modern web app by running one command.
🤪 A list of funny and tricky JavaScript examples
Mostly adequate guide to FP (in javascript)
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…
A curated list of CTF frameworks, libraries, resources and softwares
CodiMD - Realtime collaborative markdown notes on all platforms.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.
✨ A lightweight foundation for your next webpack based frontend project.
Barebone MQTT broker that can run on any stream server, the node way
XSS payloads designed to turn alert(1) into P1
The Annoying Site a.k.a. "The Power of the Web Platform"
A collection of ZAP scripts and tips provided by the community - pull requests very welcome!
Display machine state using Python3 with Flask.
Declination of @matcornic Learn theme to Hugo
A Microservices-based framework for the study of Network Security and Penetration Test techniques
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Curriculum for the ClojureBridge workshop series.
A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily i…
CS 253 Web Security course at Stanford University
Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
Add syntax highlighting and other goodies to Practical Common Lisp by Peter Seibel.
Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it into chunks. Sends those chunks out as image requests (data …