Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.
☆20Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for client-side-attacks-lab
Users that are interested in client-side-attacks-lab are comparing it to the libraries listed below
Sorting:
- Professionally Evil Web Application Penetration Testing 101☆148Jun 16, 2020Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- VilNE Scanner☆19Oct 19, 2023Updated 2 years ago
- Test Android Application.☆20Jan 22, 2016Updated 10 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Clear diverses Logs and History Files saved by Windows.☆23Oct 24, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- 🔒 Laravel farsi/persian validation☆18May 12, 2022Updated 3 years ago
- Country/Provider to IPv4 Reverse Lookup☆31Updated this week
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆142Oct 15, 2024Updated last year
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- This is a native binding of eSpeak for node. eSpeak is a compact open source software speech synthesizer for English and other languages.☆13Oct 19, 2016Updated 9 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- ☆13Sep 17, 2025Updated 6 months ago
- ☆11May 30, 2021Updated 4 years ago
- ☆17Updated this week
- A massive curated list of curated lists of various info sec/pen testing tools, resources, and tricks covering multiple verticals.☆16Nov 6, 2017Updated 8 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Feb 28, 2019Updated 7 years ago
- ☆10May 3, 2017Updated 8 years ago
- Kubernetes and Knative pipeline demo using Tekton☆12Jun 25, 2019Updated 6 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- Windows Forensics Salt States☆21Updated this week
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- A mockup landing page for a travel agency startup. This coding exercise capitalizes on the capabilities of HTML and CSS.☆14May 2, 2019Updated 6 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago