avlidienbrunn / anti-csrf-pluginView external linksLinks
Chrome extension for blocking x-origin cookies
☆12Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for anti-csrf-plugin
Users that are interested in anti-csrf-plugin are comparing it to the libraries listed below
Sorting:
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Gives medals to TOR relays☆10Jan 23, 2017Updated 9 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Redirect Tor users from nginx☆10Aug 9, 2015Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 13 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- An x86 PC emulator☆23Feb 22, 2013Updated 12 years ago
- Forces Chrome to use HTTP Strict Transport Security on all HTTPS connections☆16Jan 7, 2023Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆34Nov 6, 2014Updated 11 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year
- ☆19Jun 22, 2015Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- DLL Injection commandline utility☆26Mar 14, 2013Updated 12 years ago
- Java VM Operand Stack Viewer☆25Sep 11, 2015Updated 10 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago