The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.
☆13Apr 5, 2023Updated 2 years ago
Alternatives and similar repositories for NodeJsCookieStealer
Users that are interested in NodeJsCookieStealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- The Python cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆33Apr 5, 2023Updated 2 years ago
- The PHP cookie stealer is a tool that can be used in penetration testing (XSS attacks) to steal browser cookies for poc.☆18Apr 5, 2023Updated 2 years ago
- ☆12Apr 9, 2023Updated 2 years ago
- Flows resourcepack for the World of Keralis Minecraft server☆12Jan 29, 2026Updated last month
- 一个窃取谷歌浏览器保存的密码的示例程序,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Apr 11, 2024Updated last year
- ☆13Mar 1, 2023Updated 3 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Building a desktop Paint App clone with C++ and wxWidgets☆13May 18, 2025Updated 10 months ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- ☆11Nov 8, 2025Updated 4 months ago
- Fast path fuzzing for hidden web directories.☆18Aug 6, 2025Updated 7 months ago
- NethServer system basic behavior implementation☆11May 2, 2024Updated last year
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆38Jun 15, 2023Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- AI bot management platform for conducting "lives" on TikTok, YouTube or X☆17Mar 23, 2025Updated last year
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- A beautiful, free and open-source Minecraft launcher.☆12Feb 11, 2017Updated 9 years ago
- XSS cookie stealer using JavaScript and PHP☆69Apr 18, 2019Updated 6 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 8 months ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆15Nov 25, 2019Updated 6 years ago
- Script to collect ETH or ERC20 from a list of private key to 1 address☆12Jan 24, 2023Updated 3 years ago
- The Ethereum Classic Wiki☆10Feb 14, 2018Updated 8 years ago
- A list of all the known keys commonly used in Substrate☆11May 22, 2024Updated last year
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- XSS scanner tool to scan a list of URLs provided in a .txt file for reflected XSS(rxss) vulnerabilities. This tool is designed to efficie…☆14Jun 29, 2024Updated last year
- n8n workflows related to bug bounty☆47Oct 27, 2025Updated 4 months ago
- Command-line tool for rendering bar charts that can be displayed directly in the terminal or in text-based files like Markdown.☆19Jul 7, 2024Updated last year
- ☆28Sep 18, 2023Updated 2 years ago
- A highly efficient tool for recovering partially lost Ethereum keys☆10Dec 7, 2019Updated 6 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 9 months ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- Boilerplate template for the Intro to Storybook tutorial for Angular☆14Jan 8, 2026Updated 2 months ago