A collection of XSS Attack vectors
☆10Apr 26, 2025Updated 10 months ago
Alternatives and similar repositories for XSS
Users that are interested in XSS are comparing it to the libraries listed below
Sorting:
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- Cross Site Scripting Payloads -- Variations☆72Apr 26, 2025Updated 10 months ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Reporter plugin for https://gauge.org☆13Feb 19, 2025Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- ☆10Jun 13, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- JSON style report plugin for Gauge http://gauge.org☆11Updated this week
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Dump iceriver firmware files and filesystem☆10Oct 3, 2023Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Lot of gnuwin32 tools with aliases in PowerShell☆11Aug 20, 2015Updated 10 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- A catalog of cursors and icons from Windows 98, in original and modern formats☆16Jun 25, 2024Updated last year
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago