JakobKallin / Excess-XSSLinks
A comprehensive tutorial on cross-site scripting
☆88Updated 8 years ago
Alternatives and similar repositories for Excess-XSS
Users that are interested in Excess-XSS are comparing it to the libraries listed below
Sorting:
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Updated 7 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆171Updated 4 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Updated 7 years ago
- Protect your parents from phishing☆40Updated 8 years ago
- Exploits and research stuffs☆54Updated this week
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Universal MITM web server☆106Updated 8 years ago
- ☆63Updated 13 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆135Updated 9 years ago
- ☆54Updated 9 years ago
- PenQ is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre-configured with security t…☆82Updated 12 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- ☆73Updated 12 years ago
- ☆60Updated 8 years ago
- ☆43Updated 9 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 7 years ago
- Security tools to use on assessments.☆40Updated 9 years ago