649 / TOR-0day
JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim must visit website using correct version of Tor in order to be potentially deanonymized.
☆19Updated 8 years ago
Alternatives and similar repositories for TOR-0day:
Users that are interested in TOR-0day are comparing it to the libraries listed below
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Proof of Concepts, Exploits☆28Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ☆13Updated 2 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- ☆20Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Some Of Huawei Routers Exploits☆13Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Github Desktop RCE PoC☆28Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆13Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- ☆20Updated 7 years ago
- ☆24Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago