JohnHoder / Javascript-KeyloggerLinks
Javascript-based keylogger
☆142Updated 5 years ago
Alternatives and similar repositories for Javascript-Keylogger
Users that are interested in Javascript-Keylogger are comparing it to the libraries listed below
Sorting:
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆75Updated 5 years ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆58Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Updated 4 years ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8☆58Updated 5 years ago
- ☆59Updated 8 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 7 years ago
- A blind SQL injection module that uses bitshfting to calculate characters.☆132Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Multi-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.☆139Updated last year
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Updated 4 years ago
- Web Recon & Exploitation Tool.☆54Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated last week
- Unicode encoding attacks with machine learning☆98Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool for scan vulnerabilities in Moodle platforms☆93Updated 3 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Updated 8 years ago
- Automate Metasploit scanning and exploitation☆116Updated 6 months ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Updated 4 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆121Updated last year
- davtest (improved)- Exploits WebDAV folders☆119Updated 2 years ago
- PHP Cookie Stealing Scripts for use in XSS☆28Updated 7 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Updated last year
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Add headers to all Burp requests to bypass some WAF products☆44Updated 2 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago