Miserlou / XSS-Harvest
XSS Weaponization
☆34Updated 11 years ago
Alternatives and similar repositories for XSS-Harvest:
Users that are interested in XSS-Harvest are comparing it to the libraries listed below
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- ☆13Updated 7 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- A web app scanner☆26Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 4 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago