XSS vulnerability scanner written in Python
☆16Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for T-XSS
Users that are interested in T-XSS are comparing it to the libraries listed below
Sorting:
- WhisperVPN provides unlimited, high speed traffic routed through the Tor network ;D☆23Jul 23, 2023Updated 2 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- The first locally-hosted, open-source LLM security proxy, written completely in Rust☆43Feb 19, 2026Updated last week
- Custom discord bot developed for LOCKE, a community surrounding technology, cybersecurity, and programming☆12Jun 19, 2024Updated last year
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- LPEAssessor is a comprehensive Linux privilege escalation assessment tool designed for security professionals, system administrators, and…☆17Mar 31, 2025Updated 11 months ago
- ☆13Feb 9, 2020Updated 6 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Apache OfBiz Auth Bypass Scanner for CVE-2023-51467☆11Dec 31, 2023Updated 2 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆13Nov 14, 2023Updated 2 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- ☆14Apr 6, 2025Updated 10 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- ☆14Dec 24, 2025Updated 2 months ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- ☆12Jun 4, 2025Updated 8 months ago
- ☆11Aug 18, 2021Updated 4 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Examples of vulnerable PHP code☆12Feb 15, 2024Updated 2 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- SSRF 绕过 Payload☆15Nov 12, 2020Updated 5 years ago
- Cheat Sheet for IEC 104☆20May 23, 2022Updated 3 years ago
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- DNS utils module for bepass sdk, supporting doh, dot, dnscrypt and static hosts file like configuration☆16Jan 13, 2024Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago