agjmills / form-scrapeLinks
An example chrome extension to demonstrate the dangers of injecting javascript and html into a page
☆35Updated 8 years ago
Alternatives and similar repositories for form-scrape
Users that are interested in form-scrape are comparing it to the libraries listed below
Sorting:
- Removed according to regulations☆35Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 3 years ago
- Collection of metasploit modules☆69Updated 8 years ago
- Universal MITM web server☆107Updated 8 years ago
- Stargate☆95Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- A tool to triage screenshots☆20Updated 8 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 7 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Updated 11 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- ☆56Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago