ProfessionallyEvil / client-side-attacks-labLinks
Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.
☆20Updated 2 years ago
Alternatives and similar repositories for client-side-attacks-lab
Users that are interested in client-side-attacks-lab are comparing it to the libraries listed below
Sorting:
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Virtual Security Operations Center☆51Updated last year
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆19Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ☆54Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago