Same Origin Method Execution - Targeting Tool
Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
Vad är Same Origin Method Execution - Targeting Tool?
Same Origin Method Execution - Targeting Tool är en Chrome-tillägg utvecklad av https://benhayak.com, och dess huvudfunktion är "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.".
Tilläggsskärmbilder
Ladda ner Same Origin Method Execution - Targeting Tool-förlängningens CRX-fil
Ladda ner Same Origin Method Execution - Targeting Tool-filändelser i crx-format, installera Chrome-tillägg manuellt i webbläsaren eller dela crx-filerna med vänner för att enkelt installera Chrome-tillägg.
Användarmanual för Tillägg
This extension returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.
for more details about the SOME attack read:
https://www.blackhat.com/docs/eu-14/materials/eu-14-Hayak-Same-Origin-Method-Execution-Exploiting-A-Callback-For-Same-Origin-Policy-Bypass-wp.pdf Grundläggande Information om Tillägg
| Namn | |
| ID | fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
| Officiell webbadress | https://chromewebstore.google.com/detail/same-origin-method-execut/fkkjcdngcdcdgebgpkfanbckgkkpgkhb |
| Beskrivning | Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack. |
| Filstorlek | 27.47 KB |
| Antal Installationer | 205 |
| Aktuell Version | 0.0.2 |
| Senast Uppdaterad | 2017-03-27 |
| Publiceringsdatum | 2017-03-27 |
| Betyg | 5.00/5 Totalt 2 Betyg |
| Utvecklare | https://benhayak.com |
| Betalningssätt | free |
| Tilläggswebbplats | http://www.someattack.com |
| Stödda Språk | en |
| manifest.json | |
{
"update_url": "https:\/\/clients2.google.com\/service\/update2\/crx",
"name": "Same Origin Method Execution - Targeting Tool",
"description": "Returns a string representing a target reference for active DOM elements designed for hijacking a method execution in a SOME attack.",
"version": "0.0.2",
"icons": {
"128": "logo128.png"
},
"browser_action": {
"default_icon": "logo128.png"
},
"permissions": [
"contextMenus",
"activeTab"
],
"background": {
"scripts": [
"background.js"
]
},
"manifest_version": 2
} | |