Demo of phishing attack on the native HTML5 full screen API.
☆118Apr 18, 2013Updated 13 years ago
Alternatives and similar repositories for Fullscreen-API-Attack
Users that are interested in Fullscreen-API-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- General matrix multiplication for ndarrays☆18Jan 7, 2016Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Stagefright Android exploit☆19Aug 11, 2022Updated 3 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- PoC binary file of FakeID,with some source code☆46Aug 7, 2014Updated 11 years ago
- Dll Injection and Code injection sample☆13Mar 10, 2015Updated 11 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Block DOS attacks with Rack::Attack by presenting a captcha☆21Jun 3, 2016Updated 9 years ago
- 一次 通过 DNS 来实现部分区域 XSS 防护的简单尝试。☆11Sep 26, 2016Updated 9 years ago
- Block pages hosted on censorship sites all around the world.☆14Oct 11, 2022Updated 3 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- 🔑 YOURLS plugin to easily update your password from the web☆23Sep 28, 2025Updated 7 months ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- web端 rtmp播放器+聊天互动☆10Jan 29, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Phishing webapp generator☆41Aug 17, 2018Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 12 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 11 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 11 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago