0vulns / twitter-card-backdoor
A backdoor embedded with Twitter Player Card
☆12Updated 7 years ago
Alternatives and similar repositories for twitter-card-backdoor:
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below
- ☆20Updated 8 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- ☆27Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- XXE vulnerability demo☆22Updated 10 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Source Code Intelligence☆30Updated 7 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 4 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- potentially dangerous files for dirbusting☆15Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- ☆24Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago