A demo of overriding what's in a person's clipboard
☆1,433Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for Pastejacking
Users that are interested in Pastejacking are comparing it to the libraries listed below
Sorting:
- A demo of altering an opened tab after a timer☆123Jun 11, 2016Updated 9 years ago
- 🔑🔥📈 Next Level PGP☆3,468Mar 27, 2019Updated 6 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,352Jan 22, 2017Updated 9 years ago
- The only CSS you will ever need☆1,259Aug 11, 2017Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,225Nov 9, 2019Updated 6 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- Xaddress - Give 7 billion people an instant physical address☆1,183Sep 30, 2022Updated 3 years ago
- Security Guide for Developers☆21,069Aug 30, 2025Updated 6 months ago
- Cross-platform Linux commands in ES6☆7,760Jan 14, 2020Updated 6 years ago
- Sniffing browser history using HSTS☆936Aug 5, 2017Updated 8 years ago
- Platform to host Capture the Flag competitions☆6,570Dec 5, 2023Updated 2 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- A terminal emulator for the 21st century.☆19,125May 20, 2019Updated 6 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆412Sep 1, 2017Updated 8 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,608Apr 18, 2024Updated last year
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,092Jul 3, 2022Updated 3 years ago
- A statuspage generator that lets you host your statuspage for free on Github.☆3,899Nov 15, 2022Updated 3 years ago
- Download the entire Wayback Machine archive for a given URL.☆3,152Apr 21, 2025Updated 10 months ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,445Nov 26, 2018Updated 7 years ago
- A simple demo of phishing by abusing the browser autofill feature☆1,483Jun 5, 2021Updated 4 years ago
- AI for the Command Line☆5,783Mar 15, 2023Updated 2 years ago
- A Chrome extension that lets you know when your friends start writing to you on Facebook☆474Jun 9, 2016Updated 9 years ago
- A web-friendly way for anyone to build unusual displays☆6,446Aug 18, 2025Updated 6 months ago
- An interactive command-line HTTP and API testing client built on top of HTTPie featuring autocomplete, syntax highlighting, and more. htt…☆9,108May 21, 2024Updated last year
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago
- highlights code in any programming language☆1,489Jun 5, 2021Updated 4 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,661Sep 25, 2024Updated last year
- A curated list of topics to start learning software engineering☆5,734Jun 17, 2024Updated last year
- A hacky debugger UI for hackers☆6,351Jan 30, 2025Updated last year
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,316Jul 27, 2021Updated 4 years ago
- modest natural-language processing☆12,040Feb 23, 2026Updated last week
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,732Feb 3, 2022Updated 4 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- A simple responsive CSS Grid for humans. View Demo -☆1,447Sep 8, 2016Updated 9 years ago
- Roleplay as the NSA by making creepy graphs of your friends☆1,301Dec 30, 2017Updated 8 years ago
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago