matamorphosis / Browser-ExploitsLinks
Some Generic Browser Exploits (For Educational Purposes Only)
☆30Updated 3 years ago
Alternatives and similar repositories for Browser-Exploits
Users that are interested in Browser-Exploits are comparing it to the libraries listed below
Sorting:
- extract info from apk files☆76Updated 3 months ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- FinSpy for Android technical analysis and tools☆55Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- Random Exploits☆50Updated last year
- Fast and intuitive manager for multiple reverse shells☆86Updated 8 months ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆121Updated 4 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆41Updated 7 months ago
- ☆30Updated 5 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- ☆27Updated 4 years ago
- Exploit Pack - Project☆71Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- CVE-2021-40444 Sample☆12Updated 3 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Bypassing AWS WAF using a single ';'☆40Updated 7 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago