☆38Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerable-xss-app
Users that are interested in vulnerable-xss-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- ☆85Oct 8, 2019Updated 6 years ago
- ☆65Dec 21, 2018Updated 7 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- A (dead-simple) Golang utility allowing you to monitor HTTP endpoints☆38Feb 12, 2023Updated 3 years ago
- 致远OA通过发送特殊请求获取管理员cookie,再通过文件上传接口上传webshell压缩文件,最后发送解压请求获取webshell☆10Apr 11, 2021Updated 4 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Poetic static site generator for Node.js.☆82Jun 19, 2024Updated last year
- WinHTTP example☆17Feb 6, 2016Updated 10 years ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- ☆36Feb 17, 2020Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- This repo contains the lazyFuzzer and the Report on the output from the same☆17Oct 26, 2019Updated 6 years ago
- A Python wrapper for the updown.io API☆13Oct 17, 2024Updated last year
- FasterXML/jackson-databind 远程代码执行漏洞☆73Feb 21, 2020Updated 6 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A proof-of-concept IDE-style interface for Kaitai Struct☆17Oct 23, 2016Updated 9 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆78Feb 5, 2018Updated 8 years ago
- [ACL 2025] LongSafety: Evaluating Long-Context Safety of Large Language Models☆16Jun 18, 2025Updated 9 months ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- POC of CVE-2025-7783☆31Oct 31, 2025Updated 4 months ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Notes I've taken while working through various web app pentesting labs.☆91Apr 26, 2018Updated 7 years ago
- Fetch Metadata server security middleware for Go☆11Oct 16, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆12May 6, 2020Updated 5 years ago
- ☆15Jun 27, 2020Updated 5 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 6 years ago