Session Hijacking Visual Exploitation
☆210Mar 7, 2024Updated last year
Alternatives and similar repositories for Session-Hijacking-Visual-Exploitation
Users that are interested in Session-Hijacking-Visual-Exploitation are comparing it to the libraries listed below
Sorting:
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- ☆41Oct 20, 2023Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 4 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆142Jun 27, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆75Apr 8, 2024Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆418Jan 31, 2026Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,771May 22, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- A Red Team Activity Hub☆235Feb 12, 2026Updated 2 weeks ago
- 🛠️ Workflows created by the community☆87Dec 8, 2025Updated 2 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆405Dec 22, 2025Updated 2 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆160Jul 2, 2024Updated last year
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,108Updated this week
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆967Jan 10, 2025Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆164Nov 29, 2024Updated last year
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆247Mar 17, 2025Updated 11 months ago
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 7 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆153Mar 31, 2025Updated 11 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆287May 16, 2025Updated 9 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆607Dec 9, 2025Updated 2 months ago