ParzivalHack / T-XSSLinks
XSS vulnerability scanner written in Python
☆16Updated 2 years ago
Alternatives and similar repositories for T-XSS
Users that are interested in T-XSS are comparing it to the libraries listed below
Sorting:
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆276Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆71Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆126Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- POC | Steal user WhatsApp information/data☆74Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆98Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆238Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 4 months ago
- ☆123Updated last year
- ☆159Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- Built to learn ethical hacking on your own☆139Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- A Zphisher GUI Back-Office Plugin☆227Updated last year
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆111Updated 2 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆37Updated 4 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 6 months ago
- Automated exploit scanner for cameras on the internet☆202Updated last year
- ☆25Updated 9 months ago