koto / blog-kotowicz-net-examples
Code Examples for blog.kotowicz.net
☆134Updated 7 years ago
Related projects: ⓘ
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 7 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆45Updated 12 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆53Updated 8 years ago
- Python tool for testing vulnerabilities in WebSockets / Socket.IO servers☆70Updated 13 years ago
- ☆76Updated this week
- An implementation of the hashcat rules engine in javascript☆46Updated 6 years ago
- ☆62Updated this week
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- ☆178Updated 10 years ago
- ☆75Updated 11 years ago
- Tor Browser and Tails version fingerprint PoC☆135Updated 6 years ago
- ☆71Updated 8 years ago
- ☆198Updated 8 years ago
- Password Hash Identification☆215Updated 10 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆133Updated 7 years ago
- XSS exploitation tool - access victims through HTTP proxy☆158Updated 10 years ago
- ☆100Updated this week
- ☆56Updated 7 years ago
- A security tool to fingerprint PNG libraries used by web applications☆80Updated 5 years ago
- CVE-2015-3152 PoC☆43Updated 9 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆76Updated 9 years ago
- Phishing attack w/HTML5 offline cache framework based on Squid proxy☆30Updated 12 years ago
- ☆29Updated this week
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆94Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- a MITM attack tool☆84Updated 9 years ago