Here are
30 public repositories
matching this topic...
tcp connection hijacker, rust rewrite of shijack
Updated
Apr 25, 2021
Rust
A http/https proxy using QUIC as transport layer
flash 劫持轮子,CSRF,劫持,跳转,swf 有需求可以提issues ,src挖掘,劫持response
Updated
Nov 9, 2019
ActionScript
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Task Hijacking in Android (somebody call it also StrandHogg vulnerability)
Updated
Dec 14, 2019
Java
Client not paid ? Set a timer to kill css/js or decrease opacity over time with a js script, available remotely !
Updated
Jun 22, 2021
JavaScript
The objective of this class is offer an automatic system of protection for developers's projects and simplify some security operations as the check of CSRF or XSS all in a simple class. Infact you could just call the main method to have better security yet without too much complicated operations.
A Minecraft session hijacking tool written in Python 3
Updated
Apr 10, 2020
Python
StrandHogg Task Injection POC
Updated
Dec 27, 2019
Kotlin
Updated
Nov 20, 2020
Python
Simple Esp32 DNS Hijack Server, packaged as ESP-IDF component
Para Injeção de Codigos e DLL's em Processos
Updated
Dec 30, 2020
Python
Updated
Feb 7, 2021
PowerShell
a small framework for hooking functions and syscalls for linux kernel module rootkits
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
Updated
Sep 30, 2017
Batchfile
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
Updated
May 7, 2019
Python
This python script is used to Hijack whatsapp accounts, This program can be used in non-rooted phones too...,
Updated
Feb 6, 2022
Python
使用service worker缓解DNS被劫持的问题
Updated
Sep 13, 2018
JavaScript
Mixing trafficparrot, mitm proxy and pact.io, without using all of them. Real mocks, Recording, Inspections, PACT and NULL infrastructure at once
Updated
Mar 22, 2022
JavaScript
A very simple windows application hijacking
DLL Hijacking using DLL Proxying technique
We introduce a novel approach for Autonomous System (AS) embedding using deep learning based on only BGP announcements. Using these vectors we are able to solve multiple important classification problems such as AS business types, AS Types of Relationship (ToR) and even IP hijack detection.
Updated
Sep 17, 2021
Jupyter Notebook
Updated
Apr 19, 2018
HTML
Hijacking (intercepting) system calls by writing and installing a very basic kernel module to the Linux kernel.
Hijack Google Searching Page and do it the way you want.
Safe allocation and deallocation of memory in C . Can be used to hijack standard memory operations in C.
this is Bypassing to Kernel to purpose Execute Aut-On System
O objevo geral do trabalho é desenvolver uma aplicação usando raw sockets para sequestrar conexões TCP
injector that actually works for eac and battleye and active updates
Improve this page
Add a description, image, and links to the
hijacking
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
hijacking
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.