PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.
☆82Dec 29, 2025Updated 2 months ago
Alternatives and similar repositories for PyCript-WebSocket
Users that are interested in PyCript-WebSocket are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- ☆23Mar 4, 2025Updated last year
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- Burp Suite extension to decrypt/encrypt any encrypted traffic (AES/RSA/Encodings and more) with custom code in any language☆220Jan 9, 2026Updated 2 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆118Feb 23, 2025Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆248Updated this week
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- ☆40Aug 2, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated 2 weeks ago
- ☆11Dec 19, 2024Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆166Oct 28, 2025Updated 4 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆64Nov 15, 2025Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- ☆32Apr 1, 2025Updated 11 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 2 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago