infosec-au / little-doctorView external linksLinks
π₯π₯π₯ Out of the Browser into the Fire - Cross platform XSS worm framework π₯π₯π₯
β135Nov 17, 2016Updated 9 years ago
Alternatives and similar repositories for little-doctor
Users that are interested in little-doctor are comparing it to the libraries listed below
Sorting:
- A Github organization reconnaissance tool.β218May 22, 2023Updated 2 years ago
- β13Aug 18, 2016Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protectiβ¦β138Dec 22, 2017Updated 8 years ago
- Modified dropbear server which acts as a client and allows authless loginβ126Aug 27, 2018Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by otherβ¦β11Jan 12, 2017Updated 9 years ago
- Nameserver DNS poisoning attacks made easyβ525Feb 26, 2017Updated 8 years ago
- Next Generation Firewall Audit and Bypass Toolβ266Apr 24, 2017Updated 8 years ago
- Neet - Network Enumeration and Exploitation Toolβ167Nov 30, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ161Aug 5, 2016Updated 9 years ago
- Poison, reset, spoof, redirect MITM scriptβ126Aug 5, 2023Updated 2 years ago
- Advanced HTTP fingerprinting PoCβ45Mar 27, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposesβ22Apr 22, 2017Updated 8 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listenerβ343Aug 14, 2022Updated 3 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictionsβ226Mar 29, 2022Updated 3 years ago
- Post-exploitation scripts for OS X persistence and privescβ73Apr 12, 2017Updated 8 years ago
- unix wildcard attacksβ137May 25, 2018Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flashβ28Oct 17, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is likeβ¦β26May 12, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, β¦β122Oct 2, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account haβ¦β501Aug 7, 2020Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sourcesβ38May 16, 2017Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scriptingβ312Oct 22, 2016Updated 9 years ago
- Simple ways to 0wn simple IOT devicesβ65Mar 27, 2015Updated 10 years ago
- Various PoCsβ502Jan 27, 2020Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.β255Mar 30, 2017Updated 8 years ago
- Parallel APK analyzerβ51Jan 10, 2017Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application contβ¦β351Aug 27, 2018Updated 7 years ago
- β338Nov 23, 2016Updated 9 years ago
- Tools for 802.11 information gathering.β119May 9, 2022Updated 3 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.β204Aug 29, 2016Updated 9 years ago
- Collection of social engineering payloadsβ299Oct 19, 2017Updated 8 years ago
- Exploit the credentials present in files and memoryβ845May 25, 2023Updated 2 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.β353Jan 12, 2023Updated 3 years ago
- The databases, API's and managers behind https://websecweekly.orgβ50Mar 24, 2015Updated 10 years ago
- A collection of AWS penetration testing junkβ1,217Aug 30, 2023Updated 2 years ago
- Traverse JS files for APIs/Endpointsβ15May 12, 2015Updated 10 years ago
- β55May 30, 2017Updated 8 years ago
- Local enumeration and exploitation framework.β18Aug 16, 2017Updated 8 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&Cβ206Sep 6, 2018Updated 7 years ago