motherboardgithub / bxaqLinks
☆270Updated 6 years ago
Alternatives and similar repositories for bxaq
Users that are interested in bxaq are comparing it to the libraries listed below
Sorting:
- Frontend for https://shadowban.eu/☆118Updated 3 years ago
- Scans of North Korean IP Space☆191Updated 5 years ago
- Avast JavaScript Interactive Shell☆672Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- Documents and forensic artifacts from 2018-2019 HRW investigation reported in ”China’s Algorithms of Repression” (available at: https://w…☆46Updated 6 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆341Updated 5 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆216Updated last year
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- lovense hush buttplug exploit chain☆213Updated 5 years ago
- PoC for a NTFS crash that I discovered, in various Windows versions☆599Updated last year
- Proof-of-concept for the ZombieLoad attack☆818Updated 3 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,412Updated 6 years ago
- Chrome extension to block all users on a followers/following page.☆247Updated last year
- ☆470Updated 7 months ago
- Snowden Archive: The SIDtoday Files☆405Updated 6 years ago
- ☆221Updated 5 years ago
- Google Chrome extension implementing JavaScript Zero☆149Updated 7 years ago
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing☆647Updated 7 months ago
- Harden your Chrome browser via enterprise policy.☆291Updated 2 years ago
- ☆292Updated 4 years ago
- Check if your VPN leaks your IP address via the WebRTC technology☆184Updated 7 years ago
- ☆104Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- https://plaintextoffenders.com offenders list☆260Updated 4 years ago
- Basic Electron Exploitation☆211Updated 5 years ago
- Wannacry in-memory key recovery☆1,087Updated 8 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 5 months ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Updated 5 years ago