De3vil / PasteJacking
Hacking with PasteJacking technique
☆19Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for PasteJacking
- Generate Undetectable Metasploit Payload in a simple way☆36Updated 11 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 6 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆20Updated 3 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆32Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 7 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- ☆15Updated 2 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Dogma V1.5.3☆28Updated 4 years ago
- Whspdefendor Exploit Framework v1.0☆13Updated 11 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 2 years ago
- Generate Malicious QR or similar☆15Updated last year
- ☆27Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Simple Tool for webhacking☆10Updated last year
- PassBreaker☆54Updated 7 months ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 2 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆22Updated 3 weeks ago
- T-Converter Free v1.0☆18Updated 3 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆51Updated 2 months ago
- Social Engineering Browser Update Attack.☆54Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆56Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago