A command-line tool for Cross-Site WebSocket Hijacking
☆44Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for cswsh
Users that are interested in cswsh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Maintaining account persistence via XSS and Oauth☆77Jan 7, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- ☆33Jul 20, 2021Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Collection of scanner checks missing in Burp☆32Jun 15, 2020Updated 5 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 5 months ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆44Aug 3, 2021Updated 4 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- Where's My Browser? Learn hacking WebViews (Android Mobile App)☆44Jul 31, 2018Updated 7 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Security tool to find potential vulnerable Server Side Request Forgery (SSRF) parameters.☆357Feb 13, 2026Updated last month
- ☆10Dec 8, 2022Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆18May 27, 2022Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60May 16, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- Extension to log iframe and cross window communications.☆54Mar 14, 2023Updated 3 years ago
- ☆38Aug 19, 2021Updated 4 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 9 months ago