"><script>prompt(1)</script>''"><!--<svg>
☆18Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- ☆13May 4, 2014Updated 12 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Abbott breaks promises. Turns them back into CPS style☆26Oct 20, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- A Python multithreading HTTP server with file management☆37May 24, 2015Updated 10 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Aug 23, 2018Updated 7 years ago
- A framework for exploiting padding oracles in network-based applications☆26Apr 7, 2026Updated last month
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- Extraction of iMessage Data via XSS☆50Apr 8, 2016Updated 10 years ago
- OpenContainer tool set☆12Oct 11, 2016Updated 9 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- Chrome Extension for XSS Hunter Payloads☆42Sep 7, 2016Updated 9 years ago
- ☆71Oct 19, 2015Updated 10 years ago
- Parse FIRST FRC driver station log files☆18Mar 17, 2026Updated last month
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- collection of utilities for file manipulation in golang☆13Oct 4, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Program the Pebble with simply JavaScript☆79Oct 25, 2016Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Sep 8, 2015Updated 10 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Mar 23, 2016Updated 10 years ago
- Hipchat.com bot written in Python with a simple plugin API☆95Aug 22, 2019Updated 6 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Mar 24, 2015Updated 11 years ago
- Mosaic Target Pixel Files (TPFs) obtained by NASA's Kepler/K2 missions into CCD-sized images and movies.☆10Oct 10, 2020Updated 5 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Apr 9, 2016Updated 10 years ago
- ☆10May 23, 2019Updated 6 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Oct 9, 2015Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Top Level Domain data☆71Dec 8, 2019Updated 6 years ago
- MPRESS dumper for OS X☆65Nov 11, 2014Updated 11 years ago