wybiral / wtf
PoC to demonstrate how local service discovery can be used to violate privacy.
☆47Updated 3 years ago
Alternatives and similar repositories for wtf:
Users that are interested in wtf are comparing it to the libraries listed below
- Scan localhost for various popular services.☆70Updated 4 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Tracking time spent on webpages without JS.☆46Updated 5 years ago
- badsite.io is intended for manual testing of web security in clients and test tolos☆18Updated 6 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- A simple REST API to identify requests made from TOR network.☆27Updated 3 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆76Updated 5 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) project☆27Updated 8 months ago
- A browser extension that changes your User-Agent header to throw off tracking.☆26Updated 7 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Quickly and easily deploy content to your 1mbsite hosted site☆40Updated 3 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆14Updated 3 years ago
- An experiment to host a website with the content served over DNS.☆27Updated last year
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 7 months ago
- deletes zoom and prevents you from reinstalling it☆43Updated 4 years ago
- This is the data that drives the whynohttps.com website☆39Updated 3 years ago
- ☆51Updated 2 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- Tooling to retrieve data from Axon2 Body Cams☆45Updated 4 years ago
- When ASCII art is the executable☆71Updated 2 years ago
- 🙌 Responsive donations template for your projects.☆60Updated 3 years ago
- Let's brute force this hotel's tv.☆77Updated 5 years ago
- Web on top of any protocol☆114Updated 4 years ago
- Find PNG files with suspicious data in alpha channel☆28Updated 5 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Host a Tor hidden service inside a Docker container without exposing any clearnet ports.☆46Updated 2 years ago