jofpin / IFALinks
PoC exposing a critical IndexedDB vulnerability that enables a disk flooding attack by exploiting the lack of restrictions.
β28Updated last year
Alternatives and similar repositories for IFA
Users that are interested in IFA are comparing it to the libraries listed below
Sorting:
- ππππ ππππ§ is an OSINT tool for Facebook that uses the Facebook Pages Scraper API from the RAPIDAPI website, developed for use witβ¦β24Updated 2 months ago
- MALWARE-101==>> is a comprehensive guide to malware development. Covering basics to advanced techniques, weβll explore malware types, buiβ¦β23Updated last month
- OnionHost allows you to host dark web sites using Termux or Linux, keeping everything on your local server for secure, self-hosted privacβ¦β11Updated 9 months ago
- A simple command-line AI assistant that translates natural language into shell commands. Supports all Windows and Unix-based systems (Linβ¦β19Updated last month
- A 'Work In-Progress' OSINT, Networking, Discord, and other General Purpose Multi-Tool Written 100% in Python | Join the Discord Bβ¦β29Updated last week
- TCP over DNS tunnel b[l]ind written in go.β16Updated 11 months ago
- Fetching passwords from the chrome browser databaseβ93Updated 2 years ago
- Proxmark guideβ19Updated 9 months ago
- The best discord companion for your Serverβ12Updated 10 months ago
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.β13Updated last year
- A massive collection of Cybersecurity papers, guides and reports.β10Updated 10 months ago
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentesβ31Updated 3 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.β29Updated 2 months ago
- External tool for WebBreacher/WhatsMyName project. Client supports 'request headers' and POST requests. The script was prepared not only β¦β13Updated last year
- Host your website on the Tor π§ network in less than 2 minutes βοΈ with this tiny π€π» (less than ~15MB) docker image πβ30Updated 4 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositoriesβ12Updated last year
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.β13Updated 6 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and reverβ¦β39Updated 5 months ago
- Angular renaissance workshopβ16Updated 9 months ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.β17Updated last year
- Herramienta hecha en Bash para rastrear una IP PΓΊblica.β22Updated 4 years ago
- A spy pixel which can be emedded into web pages or emails.β104Updated last year
- Material del Curso de Hacking Etico con Pythonβ12Updated 2 years ago
- Neuron is a composable agent framework inspired by cognitive neuroscience. It enables you to build, orchestrate, and monitor intelligent β¦β23Updated 3 weeks ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routersβ89Updated 2 months ago
- NestJS project template, configured with prisma and ejsβ12Updated 11 months ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Toolβ19Updated last month
- Web-based OSINT application designed to detect and gather usernames across platforms, based on Sherlock Project.β13Updated 10 months ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.β13Updated 4 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multiplβ¦β90Updated 3 weeks ago