ParzivalHack / T-XSSLinks
XSS vulnerability scanner written in Python
☆16Updated 3 years ago
Alternatives and similar repositories for T-XSS
Users that are interested in T-XSS are comparing it to the libraries listed below
Sorting:
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆240Updated last year
- ☆125Updated last year
- A Zphisher GUI Back-Office Plugin☆236Updated 2 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆48Updated 9 months ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆115Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆154Updated 2 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- List of Command&Control (C2) software☆47Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 8 months ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21Updated 8 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆211Updated 10 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- ☆25Updated last year
- Search & Parse Password Leaks☆415Updated last year