0vulns / twitter-card-backdoorLinks
A backdoor embedded with Twitter Player Card
☆12Updated 8 years ago
Alternatives and similar repositories for twitter-card-backdoor
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below
Sorting:
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆20Updated 9 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- ☆13Updated 7 years ago
- Simple, hand-picked list of fuzz strings☆33Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- ☆13Updated 2 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- XXE attack tool☆31Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Proof of Concepts, Exploits☆28Updated 2 months ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- ☆24Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Study about HQL injection exploitation.☆51Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago