A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities
☆15Feb 13, 2017Updated 9 years ago
Alternatives and similar repositories for same-origin-method-execution
Users that are interested in same-origin-method-execution are comparing it to the libraries listed below
Sorting:
- 乌云tangscan扫描器插件☆16Apr 30, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Smart DNS Brute Forcer☆22Jul 16, 2012Updated 13 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- مستودع خاص بأكاديمية حسوب، يحوي الأمثلة المرفقة بدروس تطوير الويب☆13Sep 10, 2021Updated 4 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- A Burp-Extension can hunt some keywords that might leak sensitive information.☆26Sep 28, 2019Updated 6 years ago
- 整理团贷维权消息,寻找挽回损失办法,维护自身合法权益☆10Apr 16, 2019Updated 6 years ago
- Control yours and others pishocks via VRChat OSC☆10May 17, 2024Updated last year
- ☆38Jul 3, 2020Updated 5 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 5 months ago
- python audit tool 审计 注入 inject☆34Feb 25, 2016Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Drivers for interfacing HackRF radios with REDHAWK☆11Jun 18, 2020Updated 5 years ago
- Tools for diffing and comparing web content. Also includes a web server that makes diffs available as an HTTP service.☆15Feb 20, 2026Updated last week
- ZeroScan is a tool that auto gathers subdomains and scan ports☆55Sep 18, 2019Updated 6 years ago
- A simple demo of Google Authenticator implementation with PHP. Use this to implement a 2-factor login on your website or application with…☆10Mar 25, 2015Updated 10 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Unity package for cutting the selected area of the mesh for HoloLens.☆10Sep 21, 2020Updated 5 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- ☆18Aug 15, 2025Updated 6 months ago
- 实时监控1000家中国企业的新闻动态☆12Dec 8, 2022Updated 3 years ago
- This is a prototype of a chrome extension to make it easy to quickly test Twilio API calls.☆17Aug 30, 2011Updated 14 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Converts GIF files into Arduino sketches for MeU Square☆11Feb 13, 2018Updated 8 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year