A backdoor embedded with Twitter Player Card
☆12May 1, 2017Updated 8 years ago
Alternatives and similar repositories for twitter-card-backdoor
Users that are interested in twitter-card-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- Discovering Facebook Graph Search - keywords and☆21Apr 3, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- cve-2014-0130 rails directory traversal vuln☆18May 15, 2017Updated 8 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- this javascript file creates a pop-up for your xss poc.☆28Jan 10, 2017Updated 9 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- A custom web vulnerability scanner☆28Nov 17, 2018Updated 7 years ago
- ☆27Mar 6, 2021Updated 5 years ago
- A template for quickly creating ThreeJS projects using TypeScript and Webpack☆10Jan 23, 2024Updated 2 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Jul 31, 2017Updated 8 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Jan 8, 2022Updated 4 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- Interactive, high-performance 3D visualization app. With Computer Vision in mind.☆13Mar 18, 2023Updated 3 years ago
- CVE-2016-8610 (SSL Death Alert) PoC☆33Dec 28, 2016Updated 9 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- Gatsby.js version of petetasker.com 😎☆10Jan 11, 2023Updated 3 years ago
- Find out what great meetups people are going to!☆13Jul 20, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- My personal site. Built with Angular, Semantic UI. Webpack. Hosted on AWS S3☆11Jan 6, 2023Updated 3 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- 各种漏洞poc、Exp的收集或编写☆32Jun 24, 2016Updated 9 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple React frontend for movies and movie recommendations for neo4j-graphql☆13May 17, 2017Updated 8 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- The blog☆12Jan 22, 2024Updated 2 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆88Apr 3, 2017Updated 8 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago