Varbaek / xsserLinks
From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras
☆426Updated 5 years ago
Alternatives and similar repositories for xsser
Users that are interested in xsser are comparing it to the libraries listed below
Sorting:
- kadimus is a tool to check and exploit lfi vulnerability.☆543Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 2 months ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆317Updated last month
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆594Updated 4 years ago
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆437Updated 3 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆381Updated 4 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆431Updated last year
- a tiny tool for swf hacking, just browse it:)☆242Updated 12 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆334Updated 4 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆291Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆257Updated last year
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆481Updated 10 months ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆383Updated 6 years ago
- Fierce.pl Domain Scanner☆300Updated 6 years ago
- Damn Small XSS Scanner☆431Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆285Updated 10 years ago
- An exploit for Apache Struts CVE-2017-9805☆250Updated 7 years ago
- application server attack toolkit☆688Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆84Updated 7 years ago
- Analysis of DNS records to find popular trends☆449Updated 9 years ago
- Utils☆273Updated 9 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- An exploit for Apache Struts CVE-2017-5638☆435Updated 7 years ago