Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations
☆73Jun 29, 2016Updated 9 years ago
Alternatives and similar repositories for xss2shell
Users that are interested in xss2shell are comparing it to the libraries listed below
Sorting:
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- ☆12Aug 29, 2025Updated 5 months ago
- ☆14Sep 20, 2014Updated 11 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆57Apr 12, 2020Updated 5 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- googleusercontent.com as HTTP(S) proxy☆54Sep 12, 2020Updated 5 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆172Dec 26, 2021Updated 4 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago