0vulns / twitter-card-backdoorLinks
A backdoor embedded with Twitter Player Card
☆12Updated 8 years ago
Alternatives and similar repositories for twitter-card-backdoor
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below
Sorting:
- Simple, hand-picked list of fuzz strings☆34Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Updated 6 months ago
- XXE vulnerability demo☆22Updated 11 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- ☆20Updated 9 years ago
- Proof of Concepts, Exploits☆28Updated 7 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- A simple Shellshock scanner in python☆39Updated 11 years ago
- Exploits and research stuffs☆55Updated last month
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago