mathiasbynens / bacon-cipher
A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.
☆24Updated 9 years ago
Alternatives and similar repositories for bacon-cipher:
Users that are interested in bacon-cipher are comparing it to the libraries listed below
- Webkit uxss exploit (CVE-2017-7089)☆64Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- ☆27Updated 8 years ago
- Some useful scripts for penetration testing☆41Updated 7 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 10 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated 7 months ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Automatic detection of hashing algorithms☆21Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 5 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- A dashboard for interesting DOM tricks/techniques.☆36Updated 4 years ago
- Network white noise collector☆18Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆52Updated 6 years ago
- log file scrubber☆15Updated 6 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆83Updated 6 years ago
- Guidelines for Security Disclosures☆25Updated 5 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Parse HTTP Security Headers☆36Updated 4 months ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- A backdoor embedded with Twitter Player Card☆12Updated 7 years ago