DeepakPawar95 / cswshLinks
A command-line tool for Cross-Site WebSocket Hijacking
☆44Updated 2 years ago
Alternatives and similar repositories for cswsh
Users that are interested in cswsh are comparing it to the libraries listed below
Sorting:
- ☆48Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆76Updated 5 years ago
- ☆19Updated 4 years ago
- ☆21Updated 8 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 11 months ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Get all the CNs from a list of domains☆45Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆54Updated last year
- ☆95Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Related subdomains finder☆29Updated 3 years ago
- Return domains in CSP headers in http response☆16Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- ☆19Updated 2 years ago