feross / Fullscreen-API-Attack
Demo of phishing attack on the native HTML5 full screen API.
☆116Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for Fullscreen-API-Attack
- ☆88Updated 7 years ago
- Universal MITM web server☆106Updated 7 years ago
- A dashboard for interesting DOM tricks/techniques.☆36Updated 3 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- JSON API's Are Automatically Protected Against CSRF, And Google Almost Took It Away.☆35Updated 7 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆83Updated 6 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆393Updated 9 years ago
- simple reverse tcp backdoor hack☆62Updated 4 years ago
- ☆61Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆165Updated 2 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- A multi service threaded MD5 cracker☆65Updated 8 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆78Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Chrome Keylogger Extension☆164Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago