This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing Same Origin Policy bypass issues with browsers. Due credits were given to the researchers whose Proof of concepts have been incorporated in this test suite. Please note that, this is just the beta version, the n…
☆30Jul 12, 2019Updated 6 years ago
Alternatives and similar repositories for SOP-Bypass-Mini-Test-Suite
Users that are interested in SOP-Bypass-Mini-Test-Suite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Android app for trying Intents, Content Providers and Binder interfaces☆18Oct 29, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- ☆13May 4, 2014Updated 12 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 7 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Mar 17, 2026Updated 2 months ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Mar 24, 2015Updated 11 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- A tool written to make Fb nlp search easy and quick for users to find information regarding their friends☆14Jun 28, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆35Nov 17, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 3 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- crash poc & Leak info PoC☆16Mar 19, 2018Updated 8 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- ☆16May 9, 2016Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 9 years ago
- some expolit wrote by me☆15May 4, 2020Updated 6 years ago
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆385May 16, 2019Updated 7 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆31Jun 24, 2015Updated 10 years ago
- ☆44Sep 28, 2016Updated 9 years ago
- Code released with Shmoocon Firetalks and Epilogue talks☆45Jan 14, 2016Updated 10 years ago
- A Python program that scans RAM.☆39Jan 10, 2015Updated 11 years ago
- A Tool for the Static Analysis of Cache Side Channels☆43Mar 5, 2017Updated 9 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago