mikispag / dns-rebinding-PoC
DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olufsen speaker.
☆81Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for dns-rebinding-PoC
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- Collection of metasploit modules☆66Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- ☆133Updated 9 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 6 years ago
- Source Code Intelligence☆30Updated 7 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆77Updated 8 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆64Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- ☆47Updated 3 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago