A repository of JavaScript XSS attacks against client browsers
☆105Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for XSS-Clientside-Attacks
Users that are interested in XSS-Clientside-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Some files for bruteforcing certain things.☆27Jul 12, 2021Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆23Mar 9, 2021Updated 5 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 6 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆114Jan 25, 2024Updated 2 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆44Apr 30, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆53Mar 15, 2026Updated last month
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 11 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆18Jun 24, 2021Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Guide to SSRF☆77Oct 10, 2023Updated 2 years ago
- ☆88May 27, 2021Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 5 months ago
- c# reverse shell poc☆26Dec 22, 2025Updated 4 months ago
- Burp-suite Extension For finding .map files☆54Dec 19, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 7 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year