Dainerx / InputTounsi
A jQuery plugin for entering and validating Tunisian users' data or any other data. It is made very easy to use and easier to customize
☆29Updated 7 years ago
Alternatives and similar repositories for InputTounsi:
Users that are interested in InputTounsi are comparing it to the libraries listed below
- CyberCrowl is a python Web path scanner tool☆27Updated 5 years ago
- A php script to automatically generate json translation files for html files containing jquery.i18n's DATA Api☆15Updated 5 years ago
- A backdoor embedded with Twitter Player Card☆12Updated 7 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆82Updated 7 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- A collection of darkc0de old scripts (for education purposes only)☆85Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Bodhi - Client-side Vulnerability Playground☆117Updated 3 years ago
- ☆66Updated 6 years ago
- Hacking challenges☆32Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- Removes any instance of jRAT on your machine☆18Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- Vietnamese Password Dicts☆56Updated 11 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- 3D printed Protection mask. for tunisian doctors and medical srtaff. A prototype face shield that we developed. In three days, we went t…☆35Updated 4 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆22Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Updated last month
- A large repository of links spanning all topics in information security.☆13Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆26Updated 7 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Updated 7 years ago
- Exploit code developed/reproduced by me☆88Updated 2 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- F.Security Framwork☆19Updated 8 years ago
- ☆23Updated 7 years ago