seiyria / status-list
A list of your various social statii.
☆35Updated 7 years ago
Alternatives and similar repositories for status-list:
Users that are interested in status-list are comparing it to the libraries listed below
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Abusing trust boundaries to deliver effective phishing payloads☆33Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- ☆53Updated 8 years ago
- ☆10Updated 7 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- ☆15Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A multi-platform chat bot☆43Updated 4 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Automated OpenSSH hardening☆43Updated 7 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆16Updated 9 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago