"Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protection against session hijacking via XSS
☆14Mar 4, 2017Updated 9 years ago
Alternatives and similar repositories for HttpPwnly
Users that are interested in HttpPwnly are comparing it to the libraries listed below
Sorting:
- A passive online scanner from OWTF☆16Feb 16, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Jul 15, 2019Updated 6 years ago
- notes 2016-present☆48Jun 28, 2020Updated 5 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆127Apr 28, 2024Updated last year
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- Flash crossdomain policy security checker☆25Oct 3, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- ☆20Jul 25, 2019Updated 6 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆140May 25, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- ☆31Jun 30, 2013Updated 12 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- Cross Domain XHR: A drop-in replacement for XmlHttpRequest object.☆61Jan 31, 2013Updated 13 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- ☆78Dec 15, 2015Updated 10 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Apr 4, 2017Updated 8 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- Foundations of Computer Science notebooks☆17Oct 13, 2025Updated 5 months ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago