Cross-Site-Scripting (XSS) Automatic Scanner
☆44Oct 6, 2020Updated 5 years ago
Alternatives and similar repositories for xsspwn
Users that are interested in xsspwn are comparing it to the libraries listed below
Sorting:
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Uniscan web vulnerability scanner☆141Sep 3, 2021Updated 4 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Jan 4, 2018Updated 8 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆22Sep 8, 2019Updated 6 years ago
- Ferramenta de Reconhecimento para Pentest☆48Jul 24, 2021Updated 4 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- This repository contains additional files mentioned in the blog post☆22Feb 26, 2019Updated 7 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- NSE-script for brute force open ports☆27Jun 14, 2015Updated 10 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- 「🐞」Bug Bounty Tricks☆41Oct 4, 2023Updated 2 years ago
- check if device contains Pegasus Spyware files☆40Aug 30, 2016Updated 9 years ago
- WhatsSpy Public - Spy Tool Whatsapp☆10Aug 23, 2015Updated 10 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- Игровой автомат на js☆15Sep 1, 2016Updated 9 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week
- ☆206Mar 28, 2021Updated 4 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Feb 2, 2020Updated 6 years ago
- This will extract all information from an instagram Account.The most powerful insterscraper tool recondisioned by xRO.☆13Jun 3, 2021Updated 4 years ago
- Note 10+ (Hong Kong) wifi-service.jar☆10Oct 11, 2020Updated 5 years ago
- Connecting to WIFI and sharing on the same NIC using hostapd & wpa_supplicant☆12Sep 7, 2014Updated 11 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- Windows KMS activator☆27Nov 26, 2019Updated 6 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- ☆39Aug 5, 2016Updated 9 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago