π₯π₯π₯ Out of the Browser into the Fire - Cross platform XSS worm framework π₯π₯π₯
β135Nov 17, 2016Updated 9 years ago
Alternatives and similar repositories for little-doctor
Users that are interested in little-doctor are comparing it to the libraries listed below
Sorting:
- A Github organization reconnaissance tool.β218May 22, 2023Updated 2 years ago
- β13Aug 18, 2016Updated 9 years ago
- Nameserver DNS poisoning attacks made easyβ524Feb 26, 2017Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flashβ28Oct 17, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoCβ45Mar 27, 2017Updated 8 years ago
- Traverse JS files for APIs/Endpointsβ15May 12, 2015Updated 10 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protectiβ¦β138Dec 22, 2017Updated 8 years ago
- Abusing trust boundaries to deliver effective phishing payloadsβ35Dec 8, 2015Updated 10 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scriptingβ311Oct 22, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by otherβ¦β11Jan 12, 2017Updated 9 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictionsβ226Mar 29, 2022Updated 3 years ago
- Modified dropbear server which acts as a client and allows authless loginβ126Aug 27, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Toolβ266Apr 24, 2017Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.β20Dec 1, 2016Updated 9 years ago
- VOIP Security Audit Frameworkβ109Jan 22, 2018Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.orgβ50Mar 24, 2015Updated 10 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!β13Jan 24, 2021Updated 5 years ago
- Parallel APK analyzerβ51Jan 10, 2017Updated 9 years ago
- Poison, reset, spoof, redirect MITM scriptβ127Aug 5, 2023Updated 2 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application contβ¦β351Aug 27, 2018Updated 7 years ago
- Neet - Network Enumeration and Exploitation Toolβ168Nov 30, 2016Updated 9 years ago
- β338Nov 23, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, β¦β122Oct 2, 2018Updated 7 years ago
- unix wildcard attacksβ138May 25, 2018Updated 7 years ago
- A collection of AWS penetration testing junkβ1,221Aug 30, 2023Updated 2 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listenerβ343Aug 14, 2022Updated 3 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requestsβ56Oct 8, 2016Updated 9 years ago
- Various PoCsβ502Jan 27, 2020Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account haβ¦β501Aug 7, 2020Updated 5 years ago
- Collection of social engineering payloadsβ300Oct 19, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ161Aug 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.β18Aug 16, 2017Updated 8 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.β43Feb 6, 2019Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.β145Oct 6, 2019Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.β256Mar 30, 2017Updated 8 years ago
- Exploit the credentials present in files and memoryβ843May 25, 2023Updated 2 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowdβ194Apr 1, 2016Updated 9 years ago
- Local Privilege Escalationβ210Feb 28, 2017Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β269Mar 7, 2021Updated 5 years ago