A demo of overriding what's in a person's clipboard
☆1,435Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for Pastejacking
Users that are interested in Pastejacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A demo of altering an opened tab after a timer☆123Jun 11, 2016Updated 9 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 9 years ago
- 🔑🔥📈 Next Level PGP☆3,468Mar 27, 2019Updated 6 years ago
- The only CSS you will ever need☆1,259Aug 11, 2017Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,227Nov 9, 2019Updated 6 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,352Jan 22, 2017Updated 9 years ago
- Security Guide for Developers☆21,078Aug 30, 2025Updated 6 months ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆701May 13, 2022Updated 3 years ago
- Sniffing browser history using HSTS☆936Aug 5, 2017Updated 8 years ago
- Platform to host Capture the Flag competitions☆6,568Dec 5, 2023Updated 2 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Cross-platform Linux commands in ES6☆7,757Jan 14, 2020Updated 6 years ago
- Xaddress - Give 7 billion people an instant physical address☆1,183Sep 30, 2022Updated 3 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 3 weeks ago
- A terminal emulator for the 21st century.☆19,121May 20, 2019Updated 6 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- ☆288Jun 14, 2016Updated 9 years ago
- A Chrome extension that lets you know when your friends start writing to you on Facebook☆474Jun 9, 2016Updated 9 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆412Sep 1, 2017Updated 8 years ago
- Download the entire Wayback Machine archive for a given URL.☆3,164Apr 21, 2025Updated 11 months ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,606Apr 18, 2024Updated last year
- A statuspage generator that lets you host your statuspage for free on Github.☆3,900Nov 15, 2022Updated 3 years ago
- A web-friendly way for anyone to build unusual displays☆6,447Aug 18, 2025Updated 7 months ago
- A hacky debugger UI for hackers☆6,355Jan 30, 2025Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,450Nov 26, 2018Updated 7 years ago
- AI for the Command Line☆5,781Mar 15, 2023Updated 3 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,100Jul 3, 2022Updated 3 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Mar 3, 2022Updated 4 years ago
- An interactive command-line HTTP and API testing client built on top of HTTPie featuring autocomplete, syntax highlighting, and more. htt…☆9,116May 21, 2024Updated last year
- highlights code in any programming language☆1,489Jun 5, 2021Updated 4 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,665Updated this week
- Reflow automatically creates pull requests, ensures the code review is approved, and squash merges finished branches to master with a gre…☆1,492Mar 1, 2022Updated 4 years ago
- Clear Eyes. Full Hearts. Can’t Lose.☆1,199May 16, 2024Updated last year
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆939Aug 31, 2022Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- Roleplay as the NSA by making creepy graphs of your friends☆1,301Dec 30, 2017Updated 8 years ago
- A simple responsive CSS Grid for humans. View Demo -☆1,446Sep 8, 2016Updated 9 years ago
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago