jkingsman / bishop
Hunt for vulnerable websites as you browse.
☆131Updated 8 years ago
Alternatives and similar repositories for bishop:
Users that are interested in bishop are comparing it to the libraries listed below
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated last year
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆95Updated 6 years ago
- Chrome extension that spots web accessible Git repos.☆25Updated 9 years ago
- ☆74Updated 12 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- jPurify☆66Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago
- Write JavaScript alert(1) with Katakana characters only☆144Updated 7 years ago
- Tool to help with the exploitation of web application race conditions☆182Updated 6 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆60Updated 5 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆79Updated 9 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆191Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- ☆181Updated 11 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆251Updated 10 years ago
- A small python script to check for Cross-Site Tracing (XST)☆134Updated 9 years ago
- XSS exploitation tool - access victims through HTTP proxy☆159Updated 11 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Pixel-perfect LastPass phishing☆338Updated 9 years ago
- An automated XSS payload generator written in python.☆314Updated 8 years ago
- a MITM attack tool☆85Updated 9 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆117Updated 12 years ago