Same Origin Method Execution - Targeting Tool
Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
Apa itu Same Origin Method Execution - Targeting Tool?
Same Origin Method Execution - Targeting Tool adalah ekstensi Chrome yang dikembangkan oleh https://benhayak.com, dan fitur utamanya adalah "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.".
Screenshot Ekstensi
Unduh Berkas CRX Ekstensi Same Origin Method Execution - Targeting Tool
Unduh file ekstensi Same Origin Method Execution - Targeting Tool dalam format crx, pasang ekstensi Chrome secara manual di peramban, atau bagikan file crx dengan teman untuk menginstal ekstensi Chrome dengan mudah.
Petunjuk Penggunaan Ekstensi
This extension returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
for more details about the SOME attack read:
https://www.blackhat.com/docs/eu-14/materials/eu-14-Hayak-Same-Origin-Method-Execution-Exploiting-A-Callback-For-Same-Origin-Policy-Bypass-wp.pdf Informasi Dasar Ekstensi
| Nama | |
| ID | fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
| URL Resmi | https://chromewebstore.google.com/detail/same-origin-method-execut/fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
| Deskripsi | Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. |
| Ukuran File | 27.47 KB |
| Jumlah Instalasi | 205 |
| Versi Saat Ini | 0.0.2 |
| Terakhir Diperbarui | 2017-03-27 |
| Tanggal Publikasi | 2017-03-27 |
| Penilaian | 5.00/5 Total 2 Penilaian |
| Pengembang | https://benhayak.com |
| Tipe Pembayaran | free |
| Situs Ekstensi | http://www.someattack.com |
| Bahasa yang Didukung | en |
| manifest.json | |
{
"update_url": "https:\/\/clients2.google.com\/service\/update2\/crx",
"name": "Same Origin Method Execution - Targeting Tool",
"description": "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.",
"version": "0.0.2",
"icons": {
"128": "logo128.png"
},
"browser_action": {
"default_icon": "logo128.png"
},
"permissions": [
"contextMenus",
"activeTab"
],
"background": {
"scripts": [
"background.js"
]
},
"manifest_version": 2
} | |