MatthisC / Session-Hijacking-Visual-Exploitation-Python-Version
A python implementation of doyensec/Session-Hijacking-Visual-Exploitation
☆40Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Session-Hijacking-Visual-Exploitation-Python-Version
- Powershell commands for enumeration in Windows Active Directory environment.☆36Updated 2 years ago
- ☆304Updated 7 months ago
- ☆78Updated this week
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆128Updated 8 months ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆185Updated 2 years ago
- ☆17Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆285Updated 10 months ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆495Updated 3 months ago
- ☆534Updated 5 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆235Updated 2 months ago
- A Modern Framework for Bug Bounty Hunting☆504Updated last week
- An insane list of all dorks taken from everywhere from various different sources.☆471Updated 2 weeks ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆637Updated this week
- Script for generating revshells☆454Updated 2 months ago
- Codes sources des challenges de l'édition 2023 du 404 CTF☆61Updated last year
- HTTP 403 bypass tool☆469Updated 8 months ago
- ☆15Updated last month
- Helios: Automated XSS Testing☆128Updated 3 months ago
- A simple tool for bypassing file upload restrictions.☆784Updated 4 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆553Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆429Updated last month
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆242Updated 2 months ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆146Updated 3 months ago
- Instructions pour créer un custom GPT connecté à une console Kali Linux☆80Updated 8 months ago
- ☆493Updated 5 months ago
- Pentest Report Generator☆377Updated 2 months ago
- ☆16Updated 3 months ago