offdev / zwsp-steg-js
Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.
☆151Updated 6 years ago
Related projects: ⓘ
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆76Updated 4 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆400Updated 3 years ago
- A simple embedded Linux backdoor.☆193Updated 3 years ago
- CVE-2018-10933 very simple POC☆127Updated 5 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 6 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆165Updated 5 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Updated 4 years ago
- research☆148Updated 5 months ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆482Updated 2 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆120Updated 9 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆33Updated 5 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆403Updated 4 years ago
- A tiny and cute URL fuzzer☆386Updated last year
- GTRS - Google Translator Reverse Shell☆614Updated last year
- Python automation of Docker.sock abuse☆210Updated last year
- encode a bash command with charset $, (, ), #, !, {, }, <, \, '.☆70Updated 5 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆112Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆320Updated 6 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆619Updated 2 years ago
- CLI tool for PKCS7 padding oracle attacks☆132Updated 3 years ago
- Security Research☆94Updated 4 years ago
- Pip install exploit package☆156Updated 5 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆196Updated 5 years ago
- Gogs CVEs☆77Updated 4 years ago
- ☆29Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago