agjmills / form-scrapeLinks
An example chrome extension to demonstrate the dangers of injecting javascript and html into a page
☆35Updated 8 years ago
Alternatives and similar repositories for form-scrape
Users that are interested in form-scrape are comparing it to the libraries listed below
Sorting:
- Removed according to regulations☆35Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 6 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- A tool to triage screenshots☆19Updated 8 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- ☆56Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Stargate☆95Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago