MalwareCube / enhanced-iframe-protectionLinks
A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Browser-In-The-Browser (BITB) attacks.
☆47Updated 3 years ago
Alternatives and similar repositories for enhanced-iframe-protection
Users that are interested in enhanced-iframe-protection are comparing it to the libraries listed below
Sorting:
- ☆239Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 2 months ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆341Updated 2 years ago
- OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down☆154Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- My new C2 framework☆41Updated 3 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆222Updated 9 months ago
- ☆120Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 5 years ago
- ☆198Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- Just some lists of Malware Configs☆173Updated last year
- ☆57Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Hunting for passwords with deep learning☆235Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- Gather information from an email address connected to Office 365☆89Updated 2 years ago
- A tool to dump exposed .git repositories☆75Updated 8 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Windows And Ways To Break It☆100Updated 2 weeks ago
- Programmatically extract saved passwords from Chromium based browsers.☆124Updated 3 years ago