cxxr / lostpass
Pixel-perfect LastPass phishing
☆338Updated 9 years ago
Alternatives and similar repositories for lostpass:
Users that are interested in lostpass are comparing it to the libraries listed below
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- A fast way to scan your server for outdated software and potential exploits.☆378Updated 10 months ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- ☆115Updated 9 years ago
- Demonstrates Chrome/Firefox/Safari download 1GB favicons☆241Updated 9 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- All your IPs are belong to us.☆668Updated 6 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- iOS 8.3 Mail.app inject kit☆358Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- A demo of overriding what's in a person's clipboard☆1,428Updated last year
- Tool used to continuously monitor a Github org for mistaken public commits☆165Updated 9 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆252Updated 10 years ago
- Live at http://extractdata.club☆167Updated 8 years ago
- Go library and command line to seek for secrets on various sources.☆242Updated 5 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆274Updated 9 years ago
- pre-commit hook for Git that checks for suspicious files.☆328Updated 8 years ago
- Make pseudonymous Git commits over Tor☆182Updated 5 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- A chrome extension to creepily map your friends' locations from FB messenger☆735Updated 4 years ago
- search key to restore petya encrypted mft☆614Updated 8 years ago
- Hunt for vulnerable websites as you browse.☆130Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 8 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- ☆418Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 8 years ago
- A series of exploits used to jump the OnePlus reservation queue.☆125Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- A webshell framework for penetration testers.☆297Updated 11 months ago