doyensec / Session-Hijacking-Visual-Exploitation
Session Hijacking Visual Exploitation
☆198Updated last year
Alternatives and similar repositories for Session-Hijacking-Visual-Exploitation:
Users that are interested in Session-Hijacking-Visual-Exploitation are comparing it to the libraries listed below
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 10 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆355Updated 2 weeks ago
- Custom scan profiles for use with Burp Suite Pro☆138Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆115Updated 4 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆241Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆286Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆83Updated last year
- CVE Collection of jQuery UI XSS Payloads☆118Updated 2 years ago
- ☆168Updated 7 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆230Updated last year
- ☆139Updated 11 months ago
- ☆81Updated this week
- ☆237Updated this week
- Local File Inclusion discovery and exploitation tool☆297Updated 3 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆139Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆176Updated last year
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆90Updated last year
- ☆131Updated 5 months ago
- Enumerate / Dump Docker Registry☆174Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆148Updated 4 months ago
- Make URL path combinations using a wordlist☆174Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆116Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 4 months ago
- A Red Team Activity Hub☆203Updated 2 weeks ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆156Updated 4 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆135Updated 9 months ago
- Reverse shell that can bypass windows defender detection☆163Updated last year
- Everything and anything related to password spraying☆133Updated 10 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year