hackvertor / HTTPLeaksLinks
HTTPLeaks - All possible ways, a website can leak HTTP requests
☆15Updated 10 years ago
Alternatives and similar repositories for HTTPLeaks
Users that are interested in HTTPLeaks are comparing it to the libraries listed below
Sorting:
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- ☆25Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Removed according to regulations☆35Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆100Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆90Updated 3 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- ☆198Updated 9 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- ☆39Updated 9 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆177Updated 6 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 7 years ago
- ☆25Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Updated 7 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Universal MITM web server☆106Updated 8 years ago