seiyria / status-listLinks
A list of your various social statii.
☆35Updated 7 years ago
Alternatives and similar repositories for status-list
Users that are interested in status-list are comparing it to the libraries listed below
Sorting:
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- A multi-platform chat bot☆42Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- crack text files encrypted with vim's :X command☆22Updated 9 years ago
- ☆25Updated 7 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Recovers V8 Math.random seed from outputs, even when they are not consecutive.☆32Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Hackers in yo' kernel!☆59Updated 10 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 9 years ago