JakobKallin / Excess-XSSLinks
A comprehensive tutorial on cross-site scripting
☆88Updated 8 years ago
Alternatives and similar repositories for Excess-XSS
Users that are interested in Excess-XSS are comparing it to the libraries listed below
Sorting:
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- ☆73Updated 12 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Universal MITM web server☆107Updated 8 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 4 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- ☆63Updated 12 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- ☆90Updated 4 months ago
- retire.js has a new home☆20Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆134Updated 8 years ago
- ☆54Updated 8 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- ☆92Updated 6 years ago
- Exploits and research stuffs☆54Updated last year