Showing 1-20 of 376 packages
to be soon provided
AI-powered security research agents for vulnerability hunting and exploit development
Exploit module for Christmas.
Looking for CCXT? You've mistyped the name. Bad guys could exploit this, providing a fake version of CCXT here, but we always think a step forward :) So here's the original version you've might been looking for: https://www.npmjs.com/package/ccxt
This repository contains a Proof of Concept (PoC), demonstrating how malicious actors can exploit vulnerabilities using dependency confusion.
DVR exploit for JAWS/1.0, command execution
This is a webpack plugin designed to exploit the V8 engines treatment of functions with parens wrapped around them. This lazy loads the parsing decreasing initial load time. — Edit
Exploit tool for NextJS. Contribute at github. https://github.com/vonuyvicoo/nextploiter
Top-tier exploit-driven DeFi scanner for Immunefi High/Critical payouts. Models flash loans, MEV, and adversarial capabilities.
exploit-pos ======== ### Node.js communication library cor POS solutions
NPM tar exploit.
Exploit JSX syntax to define data models and auto generate form UI for it
A TypeScript compatible, zero dependency React component to avoid security exploits when opening a link in a new tab.
Let you exploit Tailwind in React more powerful
Lite Model Context Protocol server for comprehensive CVE intelligence gathering with multi-source exploit discovery, designed for security professionals and cybersecurity researchers
Levitate is an exploit development platform
Utilize the JavaScript VM running inside an iOS UIWebView to exploit libraries targeting the DOM (e.g. Google Charts).
Future exploit db frontend
Lite Model Context Protocol server for comprehensive CVE intelligence gathering with multi-source exploit discovery, designed for security professionals and cybersecurity researchers - Alpha Release
Lite Model Context Protocol server for comprehensive CVE intelligence gathering with multi-source exploit discovery, designed for security professionals and cybersecurity researchers