boku7 / XSS-Clientside-AttacksLinks
A repository of JavaScript XSS attacks against client browsers
☆98Updated 5 years ago
Alternatives and similar repositories for XSS-Clientside-Attacks
Users that are interested in XSS-Clientside-Attacks are comparing it to the libraries listed below
Sorting:
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- A combined wordlists for files and directory discovery☆125Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated last week
- Pentest stuff☆49Updated last year
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Notes for CRTP☆41Updated 4 years ago
- m0chan.github.io☆87Updated 2 weeks ago
- OSWE Preparation☆37Updated 6 years ago
- ☆51Updated 8 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- HTTP verb tampering & methods enumeration☆62Updated last month
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- Target practice for ffuf☆67Updated 4 years ago
- ☆55Updated 4 years ago
- Find the remote website version based on a git repository☆125Updated 4 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆150Updated 2 years ago
- The scripts I write to help me on my bug bounty hunting☆123Updated 3 years ago
- A python based blind SQL injection exploitation script☆138Updated 5 years ago
- Cheat sheet☆36Updated 5 years ago
- HTTP parameter discovery suite.☆63Updated 5 years ago
- ☆48Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 3 years ago
- Vulnerable NodeJS Web Application☆98Updated last year
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago