diracdeltas / snifflyLinks
Sniffing browser history using HSTS
☆933Updated 8 years ago
Alternatives and similar repositories for sniffly
Users that are interested in sniffly are comparing it to the libraries listed below
Sorting:
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- A demo of overriding what's in a person's clipboard☆1,432Updated last year
- How to backdoor Diffie-Hellman☆614Updated 8 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆548Updated 9 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Sleepy Puppy XSS Payload Management Framework☆1,043Updated 7 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- Advanced CPU-based password recovery utility☆2,152Updated 2 years ago
- Some public notes☆1,274Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆307Updated 3 years ago
- An experiment to authenticate web sessions with SSH - http://demo-ssh.32b6.com☆725Updated 9 years ago
- Tunneling Internet traffic over Facebook chat.☆1,292Updated 9 years ago
- *This project is no longer actively maintained. If you'd like to become the maintainer, please let us know.* ZeroDB is an end-to-end encr…☆1,556Updated 7 years ago
- iOS 8.3 Mail.app inject kit☆357Updated 6 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆415Updated 7 years ago
- Live at http://extractdata.club☆166Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Gryffin is a large scale web security scanning platform.☆2,069Updated 4 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 3 months ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,116Updated 8 years ago
- Data flow in the Tor network☆510Updated 6 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Run a script when one or more sensors fail.☆874Updated 8 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆251Updated 10 years ago
- A simple demo of phishing by abusing the browser autofill feature☆1,482Updated 4 years ago
- Decentralized feeds using BitTorrent's DHT. Idea from Arvid and The_8472 "DHT RSS feeds" http://libtorrent.org/dht_rss.html☆871Updated 9 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 2 years ago