Same Origin Method Execution - Targeting Tool
Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
What is Same Origin Method Execution - Targeting Tool?
Same Origin Method Execution - Targeting Tool is a Chrome extension developed by https://benhayak.com, and its main feature is "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.".
Extension Screenshots
Download Same Origin Method Execution - Targeting Tool Extension CRX File
Download Same Origin Method Execution - Targeting Tool extension files in crx format, manually install Chrome extensions in the browser, or share the crx files with friends to easily install Chrome extensions.
Extension Usage Instructions
This extension returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. for more details about the SOME attack read: https://www.blackhat.com/docs/eu-14/materials/eu-14-Hayak-Same-Origin-Method-Execution-Exploiting-A-Callback-For-Same-Origin-Policy-Bypass-wp.pdf
Extension Basic Information
Name | Same Origin Method Execution - Targeting Tool |
ID | fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
Official URL | https://chromewebstore.google.com/detail/same-origin-method-execut/fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
Description | Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. |
File Size | 27.47 KB |
Installation Count | 205 |
Current Version | 0.0.2 |
Last Updated | 2017-03-27 |
Publish Date | 2017-03-27 |
Rating | 5.00/5 Total 2 Ratings |
Developer | https://benhayak.com |
Payment Type | free |
Extension Website | http://www.someattack.com |
Supported Languages | en |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "name": "Same Origin Method Execution - Targeting Tool", "description": "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.", "version": "0.0.2", "icons": { "128": "logo128.png" }, "browser_action": { "default_icon": "logo128.png" }, "permissions": [ "contextMenus", "activeTab" ], "background": { "scripts": [ "background.js" ] }, "manifest_version": 2 } |