A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.
☆16Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for wagyu-xss
Users that are interested in wagyu-xss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 for studying☆28Aug 10, 2025Updated 9 months ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 6 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 11 months ago
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆83Mar 15, 2026Updated 2 months ago
- 基于协程并发的Web敏感文件扫描器,精准探测备份文件、配置泄露及版本控制目录暴露风险,为渗透测试与安全防护提供专业级资产测绘方案。☆12Mar 6, 2025Updated last year
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆130Jan 17, 2026Updated 4 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 4 years ago
- ☆26Mar 5, 2023Updated 3 years ago
- frp流量特征修改版☆15Sep 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息☆39Apr 25, 2023Updated 3 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆44Jan 18, 2025Updated last year
- Binary Hollowing☆98Sep 10, 2024Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- The RedStack DB extracted as an Obsidian Vault☆43Dec 25, 2025Updated 4 months ago
- ☆14Jun 1, 2022Updated 3 years ago
- Terminate AV/EDR leveraging BYOVD attack☆104Mar 21, 2025Updated last year
- ☆26Jan 13, 2026Updated 4 months ago
- ☆15Nov 19, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Oct 24, 2018Updated 7 years ago
- can convert EXE/DLL into position-independent shellcode☆41Feb 1, 2026Updated 3 months ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 months ago
- Burpsuite Extension for Jsmon☆24Apr 6, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- ☆48Dec 28, 2025Updated 4 months ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆85Feb 12, 2026Updated 3 months ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- 自建 WebShell 流量数据集☆18Mar 21, 2022Updated 4 years ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- ruoyi 后台定时任务注入哥斯拉内存马☆52Feb 29, 2024Updated 2 years ago