0vulns / twitter-card-backdoorLinks
A backdoor embedded with Twitter Player Card
☆12Updated 8 years ago
Alternatives and similar repositories for twitter-card-backdoor
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below
Sorting:
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 4 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated 8 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Some of my Nmap scripts☆22Updated 8 years ago
- ~ BannerGrab☆25Updated 9 years ago
- Source Code Intelligence☆30Updated 8 years ago
- ☆20Updated 9 years ago
- A shellcode testing harness.☆70Updated last year
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Babel Scripting Framework☆43Updated 5 years ago