π₯π₯π₯ Out of the Browser into the Fire - Cross platform XSS worm framework π₯π₯π₯
β134Nov 17, 2016Updated 9 years ago
Alternatives and similar repositories for little-doctor
Users that are interested in little-doctor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Github organization reconnaissance tool.β219May 22, 2023Updated 3 years ago
- β13Aug 18, 2016Updated 9 years ago
- Nameserver DNS poisoning attacks made easyβ526Feb 26, 2017Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flashβ28Oct 17, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoCβ45Mar 27, 2017Updated 9 years ago
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Traverse JS files for APIs/Endpointsβ15May 12, 2015Updated 11 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protectiβ¦β138Dec 22, 2017Updated 8 years ago
- Abusing trust boundaries to deliver effective phishing payloadsβ35Dec 8, 2015Updated 10 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scriptingβ311Oct 22, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by otherβ¦β11Jan 12, 2017Updated 9 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictionsβ227Mar 29, 2022Updated 4 years ago
- Modified dropbear server which acts as a client and allows authless loginβ126Aug 27, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Toolβ266Apr 24, 2017Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.β20Dec 1, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- VOIP Security Audit Frameworkβ109Jan 22, 2018Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.orgβ50Mar 24, 2015Updated 11 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!β13Jan 24, 2021Updated 5 years ago
- Parallel APK analyzerβ51Jan 10, 2017Updated 9 years ago
- Poison, reset, spoof, redirect MITM scriptβ128Aug 5, 2023Updated 2 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application contβ¦β351Aug 27, 2018Updated 7 years ago
- Neet - Network Enumeration and Exploitation Toolβ168Nov 30, 2016Updated 9 years ago
- β338Nov 23, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, β¦β121Oct 2, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- unix wildcard attacksβ138May 25, 2018Updated 7 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listenerβ342Aug 14, 2022Updated 3 years ago
- A collection of AWS penetration testing junkβ1,224Aug 30, 2023Updated 2 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requestsβ56Oct 8, 2016Updated 9 years ago
- Various PoCsβ501Jan 27, 2020Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account haβ¦β501Aug 7, 2020Updated 5 years ago
- Collection of social engineering payloadsβ299Oct 19, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ162Aug 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.β18Aug 16, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A passive scanning tool for finding expired domain vulnerabilities while you browse.β42Feb 6, 2019Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.β145Oct 6, 2019Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.β256Mar 30, 2017Updated 9 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowdβ193Apr 1, 2016Updated 10 years ago
- Exploit the credentials present in files and memoryβ844May 25, 2023Updated 2 years ago
- Local Privilege Escalationβ210Feb 28, 2017Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β269Mar 7, 2021Updated 5 years ago