Some Generic Browser Exploits (For Educational Purposes Only)
☆30Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for Browser-Exploits
Users that are interested in Browser-Exploits are comparing it to the libraries listed below
Sorting:
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- A project which locates the real time location of any professor/employee in the college, using the facial recognition through the CCTV Ne…☆10Oct 9, 2020Updated 5 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Jul 8, 2019Updated 6 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- ☆12Jun 5, 2024Updated last year
- A simple Fetch API library for making HTTP Requests☆14Aug 11, 2021Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Sep 2, 2022Updated 3 years ago
- CLI for the Akamai's mPulse Query API☆10Apr 22, 2025Updated 11 months ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Rewriting Armitage in Kotlin for the latest Metasploit☆16Apr 12, 2023Updated 2 years ago
- An easy to use character based menu program written in C - use it to automate some of those regular tasks. Takes a simple input text fil…☆13Nov 19, 2025Updated 4 months ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Hugo theme that powers awsomsauce!☆10Dec 6, 2022Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- An automatic test case generator for C source code using Memorized Symbolic Execution☆12May 4, 2023Updated 2 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- A Conky For parrot Os☆10Dec 3, 2018Updated 7 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Blog for x64dbg.☆13Jun 30, 2025Updated 8 months ago
- ☆15Oct 21, 2023Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- A curated list of various bug bounty tools☆19Nov 7, 2021Updated 4 years ago
- Easy phishing environment builder (Red Team)☆16Nov 19, 2024Updated last year
- Telegram bot for the Lockdoor Framework☆14Dec 15, 2019Updated 6 years ago
- Python binary DisAssembler☆25Apr 22, 2015Updated 10 years ago
- Freepascal bindings for the UnicornEngine Emulator Engine - Multi OS☆15Sep 16, 2022Updated 3 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago