This Script Will Detect Canary Token in Microsoft Word Documents
☆57Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for CanaryTokensDetector
Users that are interested in CanaryTokensDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PiFiTorAP is simple bash script for configure your Raspberry Pi 3 B/B+ as an Anonymous WiFi Hotspot.☆45Jul 26, 2019Updated 6 years ago
- Hide Your Secret Message in any Wave Audio File.☆183May 7, 2021Updated 4 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- Python script to track information of entered phone number☆15Dec 17, 2022Updated 3 years ago
- Generates an image from a given tweet! (Puppeteer + Netlify serverless functions + Svelte)☆11Jan 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,652Apr 29, 2025Updated 11 months ago
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆17Feb 22, 2021Updated 5 years ago
- ngrok-server allow you to access ngrok without Hotspot with background usage.☆12Mar 23, 2026Updated 2 weeks ago
- A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution☆42Sep 28, 2021Updated 4 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- ☆11Feb 8, 2026Updated 2 months ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- noVNC is a Python-based server that integrates noVNC and websockify to provide a web-based VNC client, enabling remote desktop access via…☆10Jan 25, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- DDoS Hack Tools Pack☆14Nov 16, 2020Updated 5 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- To-do manager, notepad, RSS reader...☆15Dec 1, 2014Updated 11 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- WordBrutePress v1.0 | WordPress Admin Panel Password Cracker [Brute Force]☆30Feb 8, 2018Updated 8 years ago
- Just a Data Structure & Algorithms repository to keep track of my progress.☆14May 20, 2022Updated 3 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Apr 21, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- sms2call app☆15Jul 20, 2025Updated 8 months ago
- Change Apk Payload mainactivity icon using this script or tool.☆26Oct 31, 2023Updated 2 years ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Apr 6, 2015Updated 11 years ago
- OWASP Foundation Web Respository☆20Feb 9, 2026Updated 2 months ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Bradford L. Barrett's web server log analysis tool☆15Oct 27, 2014Updated 11 years ago
- SVG, XML, GIF and PDF files that result in finding XSS reports on websites : The payloads are available for testing purpose only.☆15Apr 17, 2023Updated 2 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆33Apr 19, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- The teach.org publishing service for goggles and thimble☆16Dec 16, 2019Updated 6 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Experimental tagging schema for analysis of intersectionality, bias, and reception theories.☆11Feb 21, 2024Updated 2 years ago
- Pen Plotter for Bottles☆12Sep 16, 2024Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools tha…☆15Dec 15, 2018Updated 7 years ago