Same Origin Method Execution - Targeting Tool
Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
Apa itu Same Origin Method Execution - Targeting Tool?
Same Origin Method Execution - Targeting Tool adalah ekstensi Chrome yang dikembangkan oleh https://benhayak.com, dan fitur utamanya adalah "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.".
Screenshot Ekstensi
Unduh Berkas CRX Ekstensi Same Origin Method Execution - Targeting Tool
Unduh file ekstensi Same Origin Method Execution - Targeting Tool dalam format crx, pasang ekstensi Chrome secara manual di peramban, atau bagikan file crx dengan teman untuk menginstal ekstensi Chrome dengan mudah.
Petunjuk Penggunaan Ekstensi
This extension returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. for more details about the SOME attack read: https://www.blackhat.com/docs/eu-14/materials/eu-14-Hayak-Same-Origin-Method-Execution-Exploiting-A-Callback-For-Same-Origin-Policy-Bypass-wp.pdf
Informasi Dasar Ekstensi
Nama | Same Origin Method Execution - Targeting Tool |
ID | fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
URL Resmi | https://chromewebstore.google.com/detail/same-origin-method-execut/fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
Deskripsi | Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. |
Ukuran File | 27.47 KB |
Jumlah Instalasi | 205 |
Versi Saat Ini | 0.0.2 |
Terakhir Diperbarui | 2017-03-27 |
Tanggal Publikasi | 2017-03-27 |
Penilaian | 5.00/5 Total 2 Penilaian |
Pengembang | https://benhayak.com |
Tipe Pembayaran | free |
Situs Ekstensi | http://www.someattack.com |
Bahasa yang Didukung | en |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "name": "Same Origin Method Execution - Targeting Tool", "description": "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.", "version": "0.0.2", "icons": { "128": "logo128.png" }, "browser_action": { "default_icon": "logo128.png" }, "permissions": [ "contextMenus", "activeTab" ], "background": { "scripts": [ "background.js" ] }, "manifest_version": 2 } |