Skip to content

iifiigii/evi3lm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PURPOSE

Just like the threat posed by phishing WIFI, there are also risks associated with using unauthenticated chat models. This project will provide several proofs of concept using the mode of man in the middle attack.

TODO

  • Web Page
  • Sensitive Information Collection
  • XSS/CSRF
  • Golang Supply Chain