AnonKryptiQuz / ScriptoXLinks
ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.
☆17Updated last year
Alternatives and similar repositories for ScriptoX
Users that are interested in ScriptoX are comparing it to the libraries listed below
Sorting:
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Updated 6 months ago
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Updated last week
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆15Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 9 months ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- ☆24Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 5 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆13Updated last week
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- OOB listener powered by cloudflare workers☆12Updated 9 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year