dxa4481 / windowHijackingLinks
A demo of altering an opened tab after a timer
☆123Updated 9 years ago
Alternatives and similar repositories for windowHijacking
Users that are interested in windowHijacking are comparing it to the libraries listed below
Sorting:
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 8 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Universal MITM web server☆108Updated 8 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆95Updated 6 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 8 years ago
- Hunt for vulnerable websites as you browse.☆132Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- ☆73Updated 12 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- ☆54Updated 8 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago