Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.
☆20Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for client-side-attacks-lab
Users that are interested in client-side-attacks-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Test Android Application.☆20Jan 22, 2016Updated 10 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Aug 3, 2020Updated 5 years ago
- ☆12Feb 25, 2026Updated 2 months ago
- A minimal MCP Server based on the Anthropic's "think" tool research☆24Aug 1, 2025Updated 9 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Mar 8, 2018Updated 8 years ago
- ☆19Mar 6, 2012Updated 14 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- WebEngineering Project☆13Nov 16, 2011Updated 14 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- ☆13Sep 17, 2025Updated 8 months ago
- An RSS headline aggregator.☆12May 9, 2026Updated last week
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17May 14, 2026Updated last week
- Exploits for TRENDNet routers☆14Apr 21, 2020Updated 6 years ago
- A massive curated list of curated lists of various info sec/pen testing tools, resources, and tricks covering multiple verticals.☆16Nov 6, 2017Updated 8 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Firmware for supported CAN adapters☆12Mar 4, 2015Updated 11 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Feb 28, 2019Updated 7 years ago
- Kubernetes and Knative pipeline demo using Tekton☆12Jun 25, 2019Updated 6 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- DeTT&CT Editor☆12Apr 29, 2026Updated 3 weeks ago
- A tool to assist in the development of landing pages for phishing campaigns☆16Oct 3, 2022Updated 3 years ago
- ☆10Aug 17, 2021Updated 4 years ago