JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim must visit website using correct version of Tor in order to be potentially deanonymized.
☆20Jan 22, 2017Updated 9 years ago
Alternatives and similar repositories for TOR-0day
Users that are interested in TOR-0day are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Jul 24, 2017Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Nov 13, 2018Updated 7 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- The iOS 11 dock on iOS 10.☆10Jan 8, 2018Updated 8 years ago
- Google hacking info☆19Jan 28, 2021Updated 5 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Apr 16, 2017Updated 8 years ago
- Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake, with a force installation of cydia on every run☆10Mar 3, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- A custom build of Cydia, designed for Meridian.☆12Jun 1, 2018Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- An Amazon OSINT scraper for potential scam accounts☆33Jan 17, 2019Updated 7 years ago
- as stated in the title☆14Updated this week
- Программирование боевого софта под Linux☆17Aug 2, 2021Updated 4 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- CVE-2026-20637: AppleSEPKeyStore Use-After-Free — iOS/macOS kernel vulnerability (patched in 26.4)☆50Apr 6, 2026Updated last week
- Lynx 2 Settings Localizations☆12Jun 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jun 15, 2022Updated 3 years ago
- a small tool for auditting weak ssh password☆23Feb 24, 2018Updated 8 years ago
- iOS 17 Major and Beta version releases updates☆11Oct 16, 2023Updated 2 years ago
- Repository for mtacs.github.io☆15Jun 6, 2019Updated 6 years ago
- Install Jailbreak tweaks without the hassle (Windows Version, Electra [iOS 11 - 11.1.2] Jailbreak Toolkit)☆15Feb 1, 2018Updated 8 years ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platform☆13Jun 22, 2018Updated 7 years ago
- Jailbreak IOS 10.2.1-10.3☆12Jan 31, 2017Updated 9 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Enables certain internal features on production builds of iOS.☆15Feb 18, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 7 years ago
- Official Webpage for Project Manticore☆13Apr 20, 2021Updated 4 years ago
- Example of CVE-2022-46689 aka MacDirtyCow.☆14Mar 1, 2023Updated 3 years ago
- IOHIDFamily 0day☆443Jan 10, 2023Updated 3 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- extra_recipe research platform☆12Oct 14, 2017Updated 8 years ago