agjmills / form-scrape
An example chrome extension to demonstrate the dangers of injecting javascript and html into a page
☆35Updated 7 years ago
Alternatives and similar repositories for form-scrape:
Users that are interested in form-scrape are comparing it to the libraries listed below
- Collection of metasploit modules☆67Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- Removed according to regulations☆35Updated 7 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆56Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- An implementation of the hashcat rules engine in javascript☆47Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago