dxa4481 / XSSJackingLinks
Abusing Self-XSS and Clickjacking to trigger XSS
☆135Updated 8 years ago
Alternatives and similar repositories for XSSJacking
Users that are interested in XSSJacking are comparing it to the libraries listed below
Sorting:
- ☆181Updated 11 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- Web Application Security☆127Updated last year
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆258Updated last month
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 9 years ago
- ☆162Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- An automated XSS payload generator written in python.☆315Updated 9 years ago
- Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.☆139Updated last year
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆123Updated 7 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆151Updated 2 months ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- An extremely fast and flexible web fuzzer☆218Updated 2 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆222Updated 3 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Updated 7 years ago