0vulns / twitter-card-backdoorLinks
A backdoor embedded with Twitter Player Card
☆12Updated 8 years ago
Alternatives and similar repositories for twitter-card-backdoor
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below
Sorting:
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆33Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Updated 7 years ago
- Webkit uxss exploit (CVE-2017-7089)☆64Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Exploits and research stuffs☆55Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- ☆20Updated 9 years ago
- ~ BannerGrab☆25Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆42Updated 3 years ago