DeepakPawar95 / cswshView external linksLinks
A command-line tool for Cross-Site WebSocket Hijacking
☆44Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for cswsh
Users that are interested in cswsh are comparing it to the libraries listed below
Sorting:
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Maintaining account persistence via XSS and Oauth☆77Jan 7, 2019Updated 7 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- ☆33Jul 20, 2021Updated 4 years ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 4 months ago
- ☆34Jun 23, 2021Updated 4 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 3 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Jul 12, 2021Updated 4 years ago
- Pentest Checklists☆20Aug 23, 2020Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Jul 31, 2020Updated 5 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- Automatically deploy a Cuckoo sandbox☆23Jun 6, 2023Updated 2 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- NotSoCereal: A Deserialization exploit playground☆54Jan 13, 2022Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Feb 19, 2021Updated 4 years ago
- Security tool (now AI powered 🤖) to find potential vulnerable Server Side Request Forgery (SSRF) parameters.☆353Jan 29, 2026Updated 2 weeks ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 3 months ago
- Discover web technologies in web applications from your terminal☆55Nov 18, 2021Updated 4 years ago
- ☆24Nov 11, 2022Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Get list of subsidiaries for a selected company☆31Dec 21, 2024Updated last year
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago