A repository of JavaScript XSS attacks against client browsers
☆105Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for XSS-Clientside-Attacks
Users that are interested in XSS-Clientside-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Some files for bruteforcing certain things.☆26Jul 12, 2021Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Jan 25, 2024Updated 2 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆53Mar 15, 2026Updated 2 weeks ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- ☆88May 27, 2021Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 4 months ago
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- Burp-suite Extension For finding .map files☆54Dec 19, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 5 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 6 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year