Here are
33 public repositories
matching this topic...
Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)
TermiJack surreptitiously hijacks standard streams (stdin, stdout, and/or stderr) from an already running process.
Updated
Aug 31, 2015
Python
An Android Library with demo application, to send media and text messages via Whatsapp on rooted device
Updated
Apr 9, 2022
Python
Updated
Feb 14, 2018
Python
flash 劫持轮子,CSRF,劫持,跳转,swf 有需求可以提issues ,src挖掘,劫持response
Updated
Nov 9, 2019
ActionScript
OK now. Let's hijack github user's custom domain.
Updated
May 16, 2018
Shell
Calculate the number of available CPUs in the container.
Client not paid ? Set a timer to kill css/js or decrease opacity over time with a js script, available remotely !
Updated
Jun 22, 2021
JavaScript
A Minecraft session hijacking tool written in Python 3
Updated
Apr 10, 2020
Python
PoC of injecting code into a running Linux process
A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.
Updated
Oct 19, 2020
Python
Simple tool/script for generating malicious Linux shared libraries
Updated
Sep 1, 2021
Shell
An android HTTP capture & hijacking tool via VPN
Updated
Nov 16, 2020
Java
💥 Simple implementation of arp poisoning attack ;)
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
This python script is used to Hijack whatsapp accounts, This program can be used in non-rooted phones too...,
Updated
May 31, 2022
Python
Inspect and manipulate the memory of running processes
Detection(find) dns hijack node js
Updated
Apr 13, 2017
JavaScript
hijack dll Source Code Generator. support x86/x64
For Amazon FireTV Stick 4K
Updated
Apr 21, 2020
Java
Test your device on clipboard hijacker
Updated
Oct 13, 2020
Ruby
Hijack Google Searching Page and do it the way you want.
Updated
Apr 2, 2019
JavaScript
Adaptive DLL hijacking / dynamic export forwarding
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
It's Another EAC Bypass for Game Rust :D
Improve this page
Add a description, image, and links to the
hijack
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
hijack
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.