A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities
☆16Feb 13, 2017Updated 9 years ago
Alternatives and similar repositories for same-origin-method-execution
Users that are interested in same-origin-method-execution are comparing it to the libraries listed below
Sorting:
- مستودع خاص بأكاديمية حسوب، يحوي الأمثلة المرفقة بدروس تطوير الويب☆13Sep 10, 2021Updated 4 years ago
- Converts GIF files into Arduino sketches for MeU Square☆11Feb 13, 2018Updated 8 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- 乌云tangscan扫描器插件☆16Apr 30, 2017Updated 8 years ago
- ☆13Oct 6, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Companion Material for the book: Building Embedded Systems - Programmable Hardware☆14Jun 6, 2016Updated 9 years ago
- Fast and passive subdomain enumeration.☆19Apr 18, 2022Updated 3 years ago
- A Burp-Extension can hunt some keywords that might leak sensitive information.☆26Sep 28, 2019Updated 6 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- AWS Lambda shell commands in $PATH available to runtime subprocesses☆12Sep 1, 2021Updated 4 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Smart DNS Brute Forcer☆22Jul 16, 2012Updated 13 years ago
- OSCP material tools and helpful scripts.☆13Mar 14, 2025Updated last year
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- The disclosure website for httpoxy☆10Jan 20, 2023Updated 3 years ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- ☆21Aug 31, 2025Updated 6 months ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Feb 7, 2018Updated 8 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- a 2.4 GHz SDR neighbor using 1 bit ADC☆30Dec 6, 2021Updated 4 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A Docker image with Dradis: A collaboration and reporting platform for IT security experts.☆12Apr 9, 2024Updated last year
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- ☆12Apr 20, 2017Updated 8 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- a minimal event-driven, flexible, portable and micro PHP web application framework☆56Sep 27, 2016Updated 9 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- Ubuntu setup instructions for the Dell XPS 9550☆17Nov 17, 2016Updated 9 years ago