A xss target for practicing
☆10Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for xss-target
Users that are interested in xss-target are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Make beautiful, interactive timelines on the web.☆13Aug 16, 2013Updated 12 years ago
- Match Tracker demo showing how to use Apache Kafka, IBM Bluemix and Twitter Insights to process real-time social media streams.☆10Apr 22, 2016Updated 9 years ago
- 🐛 Kotlin 开发的一个小爬虫项目☆10Oct 21, 2017Updated 8 years ago
- ☆77Feb 17, 2017Updated 9 years ago
- Orbiter is a tool for collecting and redistributing webhooks over the network.☆20Sep 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- HTTP Protocol Stack CVE-2021-31166☆13Oct 17, 2024Updated last year
- Patch an Electron app to apply your own changes☆16Mar 19, 2026Updated last week
- ☆10Jun 1, 2014Updated 11 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- MP2225PCB&焊接文件☆13Apr 27, 2022Updated 3 years ago
- Local-first observability for AI agents. Tokens, cost, latency, and traces — stored locally, queryable with SQL.☆54Updated this week
- A toolkit that provides easy access with procfs and devfs☆14Sep 27, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- 奇安信报开源软件漏洞cve所用目录。每个人报漏洞请建立自己的目录。☆46Jul 23, 2019Updated 6 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- ☆12Jun 3, 2025Updated 9 months ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Yet another IPython notebook to LaTeX converter - this one exports clean code easily absorbed in other reports.☆16Jun 1, 2023Updated 2 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- A Personalized Notion☆17Feb 28, 2026Updated last month
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获☆10Feb 27, 2018Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Whatever apt group's js from their scanbox framework☆11Jun 22, 2016Updated 9 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- Keras implementation of cnn model with dlib for face recognition☆10Apr 2, 2019Updated 6 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- TCD1304 device provides highly reproducible, linear response for precision photo-/radio-metric spectrometry and holographic imaging. Incl…☆30Jan 21, 2026Updated 2 months ago
- python版挖掘鸡☆12Nov 19, 2015Updated 10 years ago
- Bringing Shikata ga nai to the front html☆23Apr 28, 2022Updated 3 years ago
- Burp Wiener API (Legacy)☆63Dec 1, 2023Updated 2 years ago
- A plugin that integrate MOSS and JPlag to Moodle and provide other useful features☆11May 23, 2019Updated 6 years ago