Chrome Extension for XSS Hunter Payloads
☆42Sep 7, 2016Updated 9 years ago
Alternatives and similar repositories for xssHunterExtension
Users that are interested in xssHunterExtension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WHY?☆18Sep 4, 2016Updated 9 years ago
- XSS Hunter correlated injection API guide☆21Mar 24, 2016Updated 10 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- Alternative to XSS Hunter for blind XSS.☆50Dec 8, 2022Updated 3 years ago
- XSSHunter written in Go with more notifications and features☆57Updated this week
- Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.☆20Jul 10, 2021Updated 4 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Programming problems☆15Jun 13, 2019Updated 6 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Feb 29, 2016Updated 10 years ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Automatically extracts API Keys from APK files☆13Feb 1, 2022Updated 4 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- The fastest way to setup XSSHunter. It has options for the official and Discord/Slack Forks☆46Mar 2, 2024Updated 2 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆13Dec 30, 2024Updated last year
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- Live Visualization of Call Stack in Running Java Applications with THREE.js☆22Dec 15, 2022Updated 3 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Jun 25, 2017Updated 8 years ago
- Python tool to check for expired domains still allowed in crossdomain.xml files☆13Jan 11, 2017Updated 9 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Reverse engineer protobuf from javanano☆29Mar 21, 2017Updated 9 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆103May 1, 2022Updated 3 years ago
- ☆15Nov 27, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Credentials Checking Framework☆53Feb 8, 2023Updated 3 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- Web Application Security☆131Jan 6, 2026Updated 2 months ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago