dneprDroid / chrome-poc-demoLinks
Example for the Google Chrome cache attack to inject custom code into web pages (macOS, Linux, browser version: 124.0.6367.62 and older)
☆12Updated last year
Alternatives and similar repositories for chrome-poc-demo
Users that are interested in chrome-poc-demo are comparing it to the libraries listed below
Sorting:
- ☆23Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆160Updated last year
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Updated 6 months ago
- Fortinet FortiClient EMS SQL Injection☆50Updated last year
- Objective C dylibHijackScanner and analysis tool☆39Updated 2 years ago
- Covert data exfiltration via DNS☆47Updated 6 months ago
- Repo of the SQL database from the LockBit panel being hacked.☆27Updated 3 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Updated last year
- ☆27Updated 2 years ago
- ☆109Updated 9 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆64Updated last week
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 8 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connect…☆44Updated last year