steal cookies from website using xss
☆12Mar 25, 2020Updated 5 years ago
Alternatives and similar repositories for cookie-stealer
Users that are interested in cookie-stealer are comparing it to the libraries listed below
Sorting:
- Not just another XSS tool☆13Jun 17, 2018Updated 7 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- Auto IP range scanner & exploit tool for BlueKeep metasploit module☆24Nov 16, 2021Updated 4 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆24Mar 31, 2021Updated 4 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- XSS cookie stealer using JavaScript and PHP☆68Apr 18, 2019Updated 6 years ago
- ⚡️ Multiple target ZAP Scanning☆105Feb 25, 2026Updated last week
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Oct 2, 2023Updated 2 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆31Sep 6, 2019Updated 6 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆10Dec 10, 2013Updated 12 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- Information gathering & OSINT reconnaissance tool for phone numbers☆14Dec 10, 2018Updated 7 years ago
- Simple component based 2D/3D game engine for Windows & Android☆13Jan 19, 2021Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Project the video stream of the Raspberry Pi camera onto a plane in A-Frame VR.☆10Jul 26, 2018Updated 7 years ago
- ☆11May 28, 2020Updated 5 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 2 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago