feross / Fullscreen-API-Attack
Demo of phishing attack on the native HTML5 full screen API.
☆116Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for Fullscreen-API-Attack
- A dashboard for interesting DOM tricks/techniques.☆36Updated 3 years ago
- ☆61Updated 7 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆235Updated last year
- ☆88Updated 7 years ago
- ☆74Updated 11 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆393Updated 9 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆120Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆52Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆23Updated 3 years ago
- Crack MD5 passwords with JavaScript Web Workers☆386Updated 7 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆71Updated 12 years ago
- A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.☆24Updated 9 years ago
- Protect your parents from phishing☆39Updated 6 years ago
- Hunt for vulnerable websites as you browse.☆130Updated 7 years ago
- XSS exploitation tool - access victims through HTTP proxy☆158Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Shell-style script to search exploit-db.com exploits.☆59Updated 2 months ago
- Automated XSS Finder☆60Updated 11 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- XSS Weaponization☆34Updated 11 years ago
- Backup scripts I use on my drives.☆25Updated 6 years ago