MatthisC / Session-Hijacking-Visual-Exploitation-Python-VersionLinks
A python implementation of doyensec/Session-Hijacking-Visual-Exploitation
☆43Updated 2 years ago
Alternatives and similar repositories for Session-Hijacking-Visual-Exploitation-Python-Version
Users that are interested in Session-Hijacking-Visual-Exploitation-Python-Version are comparing it to the libraries listed below
Sorting:
- HTTP 403 bypass tool☆609Updated last year
- A simple tool for bypassing file upload restrictions.☆890Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆414Updated last year
- recon for bug hunters☆859Updated 2 months ago
- A fast WordPress plugin enumeration tool☆752Updated 3 weeks ago
- Powershell commands for enumeration in Windows Active Directory environment.☆46Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆752Updated 2 years ago
- A Modern Framework for Bug Bounty Hunting☆650Updated 11 months ago
- Scripts for offensive security☆178Updated 8 months ago
- ⚡ Dynamically generated your Root-me.org stats for your github readmes☆23Updated last year
- Script for generating revshells☆479Updated last year
- Shodan Dorks☆480Updated 11 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 9 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆730Updated last year
- Header Exploitation HTTP☆704Updated this week
- Koth - TryHackMe Tricks☆190Updated 2 years ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆198Updated 3 years ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆113Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆550Updated this week
- Pentest Report Generator☆441Updated 3 months ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆145Updated 9 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆444Updated 2 years ago
- Web Security Scanner☆370Updated 2 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆258Updated 6 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Updated 2 years ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆514Updated 2 months ago
- Bookmarklet to find endpoints easily with one click☆74Updated last year
- Ultimate Burp Suite Exam and PortSwigger Labs Guide.☆367Updated 5 months ago
- AI-powered ffuf wrapper☆638Updated last month