feross / Fullscreen-API-AttackLinks
Demo of phishing attack on the native HTML5 full screen API.
☆118Updated 12 years ago
Alternatives and similar repositories for Fullscreen-API-Attack
Users that are interested in Fullscreen-API-Attack are comparing it to the libraries listed below
Sorting:
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- Chrome Keylogger Extension☆166Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆168Updated 3 years ago
- ARP Poisoning Defense Scripts☆38Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆241Updated 2 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- A collection of exploits for different VoIP products.☆261Updated last month
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A Cloudflare resolver that works☆147Updated 6 years ago
- Universal MITM web server☆107Updated 8 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Updated 9 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Updated 10 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆49Updated 9 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- ☆27Updated 8 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 5 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Anti-Anti-Automation Framework☆99Updated 11 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Phishing attack w/HTML5 offline cache framework based on Squid proxy☆31Updated 13 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 9 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆74Updated 13 years ago