Session Hijacking Visual Exploitation
☆210Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for Session-Hijacking-Visual-Exploitation
Users that are interested in Session-Hijacking-Visual-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆41Oct 20, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- ☆93Apr 29, 2024Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams