A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.
☆16Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for wagyu-xss
Users that are interested in wagyu-xss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 for studying☆28Aug 10, 2025Updated 8 months ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆76Mar 15, 2026Updated last month
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 11 months ago
- AbuseIPDB integration enabling automatic reporting of malicious activity detected by T-Pot honeypots by monitoring logs, analyzing attack…☆17Apr 20, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- 亿赛通综合漏洞利用工具☆32Jan 16, 2025Updated last year
- 基于协程并发的Web敏感文件扫描器,精准探测备份文件、配置泄露及版本控制目录暴露风险,为渗透测试与安全防护提供专业级资产测绘方案。☆12Mar 6, 2025Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 3 months ago
- ☆16Dec 15, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- frp流量特征修改版☆15Sep 19, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息☆39Apr 25, 2023Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆24Apr 12, 2023Updated 3 years ago
- Wireless tool to communicate with IR based ESLs from a smartphone ;-)☆12Oct 15, 2024Updated last year
- Variant files for partial Wiphone support.☆12May 9, 2024Updated last year
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆44Jan 18, 2025Updated last year
- Binary Hollowing☆96Sep 10, 2024Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- ☆14Jun 1, 2022Updated 3 years ago
- ☆26Jan 13, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 19, 2023Updated 2 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated 3 weeks ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Scripts to summarize and query documents using LLMs☆24Mar 30, 2024Updated 2 years ago
- ☆48Dec 28, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t …☆13Feb 4, 2024Updated 2 years ago
- ☆85Feb 12, 2026Updated 2 months ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- 自建 WebShell 流量数据集☆18Mar 21, 2022Updated 4 years ago