There are 2 repositories under hijacking topic.
Typora plugin. feature enhancement tool | Typora 插件,功能增强工具
A http/https proxy using QUIC as transport layer
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Task Hijacking in Android (somebody call it also StrandHogg vulnerability)
Learning Process Injection and Hollowing techniques
Client not paid ? Set a timer to kill css/js or decrease opacity over time with a js script, available remotely !
The objective of this class is offer an automatic system of protection for developers's projects and simplify some security operations as the check of CSRF or XSS all in a simple class. Infact you could just call the main method to have better security yet without too much complicated operations.
Mixing trafficparrot, mitm proxy and pact.io, without using all of them. Real mocks, Recording, Inspections, PACT and NULL infrastructure at once
Simple Esp32 DNS Hijack Server, packaged as ESP-IDF component
Caterpillar Proxy - The simple and parasitic web proxy with SPAM filter (formerly, php-httpproxy)
Para Injeção de Codigos e DLL's em Processos
XMRig Service Installer: An automation tool to swiftly set up the xmrig mining software as a background service on Windows. Designed for educational and research purposes, it streamlines the miner's installation and offers an easy way to run xmrig on-demand.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This App allows you to Broadcast your own Music to every radio in a specific range using a custom frequency. It requires a Raspberry Pi and PiFmRds Project found on Github.
We introduce a novel approach for Autonomous System (AS) embedding using deep learning based on only BGP announcements. Using these vectors we are able to solve multiple important classification problems such as AS business types, AS Types of Relationship (ToR) and even IP hijack detection.
DLL Hijacking using DLL Proxying technique
A implementation of NVIDIA Overlay Hijacker using Rust and WinAPI
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
University Project - Hijacking Tool for Sonos Network Speakers
DroneCharmer2 is an upgraded version of github.com/tukru/DroneCharmer inspired by the badass motherfuckers in Ukraine! <3
Basic attempt to thread hijack from a target process and run shellcode with it.