A command-line tool for Cross-Site WebSocket Hijacking
☆44Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for cswsh
Users that are interested in cswsh are comparing it to the libraries listed below
Sorting:
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Maintaining account persistence via XSS and Oauth☆77Jan 7, 2019Updated 7 years ago
- ☆33Jul 20, 2021Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 5 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆48Apr 2, 2025Updated 11 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- Where's My Browser? Learn hacking WebViews (Android Mobile App)☆44Jul 31, 2018Updated 7 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Jul 12, 2021Updated 4 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated 2 weeks ago
- Automatically deploy a Cuckoo sandbox☆23Jun 6, 2023Updated 2 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- NotSoCereal: A Deserialization exploit playground☆54Jan 13, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆29Dec 7, 2025Updated 3 months ago
- Prototype Pollution Scanner☆139Apr 11, 2021Updated 4 years ago