jezabel.net

hacker's codex / curated code library

the codex

not scripts. not snippets. complete modules. battle-tested. production-ready. ethical or otherwise.

→ import { exploit } from 'jezabel/core';
→ const target = document.querySelector('.vulnerable');
→ exploit.execute(target, payload);
// your code. your rules.
javascript

core exploits

DOM manipulation. XSS vectors. Event hijacking. The fundamentals every hacker needs.

◉ 47 modules ◉ es6+
html

structural patterns

Semantic bypass. Form injection. Template exploits. Structure is vulnerability.

◉ 23 patterns ◉ html5
css

visual deception

Overlay attacks. UI redressing. Clickjacking frameworks. What you see isn't what you get.

◉ 31 techniques ◉ css3

hacker ethos

access the library

$ jezabel init
→ authenticating...
→ codex access: granted
→ modules available: 101
$

browse. download. implement. no restrictions.

ready to enter the codex?

access library