agjmills / form-scrapeLinks
An example chrome extension to demonstrate the dangers of injecting javascript and html into a page
☆35Updated 8 years ago
Alternatives and similar repositories for form-scrape
Users that are interested in form-scrape are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Removed according to regulations☆35Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Updated 11 years ago
- A tool to triage screenshots☆19Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ☆56Updated 8 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- Universal MITM web server☆108Updated 8 years ago
- Collection of metasploit modules☆69Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- An opensource project similar to HoneyDocs☆26Updated 9 years ago