XSS Bypass
☆30Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for XSS_Bypass
Users that are interested in XSS_Bypass are comparing it to the libraries listed below
Sorting:
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- a multithreaded fast tool to preform active subdomain enumeration☆36Sep 13, 2022Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- ☆18Nov 25, 2025Updated 3 months ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- A powerful reconnaissance tool written in Bash scripting. It can be used to scan networks, gather information about hosts, and identify v…☆17Oct 6, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Some files for bruteforcing certain things.☆25Jul 12, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- XSS cookie stealer using JavaScript and PHP☆69Apr 18, 2019Updated 6 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Hard fork of mcguinness/saml-idp; a local SAML Identity Provider (IdP) library to test SAML 2.0 Service Providers (SPs).☆11Oct 8, 2024Updated last year
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 9 months ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 8 months ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- ☆15May 6, 2023Updated 2 years ago
- ☆63Jul 14, 2025Updated 8 months ago
- ☆61Jan 4, 2022Updated 4 years ago
- ☆11Jun 30, 2025Updated 8 months ago
- php - asp - aspx☆26Jan 10, 2018Updated 8 years ago