List of advanced XSS payloads
☆86Aug 23, 2016Updated 9 years ago
Alternatives and similar repositories for XSS-Payloads
Users that are interested in XSS-Payloads are comparing it to the libraries listed below
Sorting:
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆189Apr 26, 2020Updated 5 years ago
- ☆432Feb 2, 2022Updated 4 years ago
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- ☆20Feb 25, 2022Updated 4 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24May 11, 2016Updated 9 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Notes for Beginner Network Pentesting Course☆6,206Sep 21, 2022Updated 3 years ago
- These are payloads to hunt for various bugs in web applications. from SQLi, xss, RCE to path traversal and more with XSS and fuzzing.☆11Oct 3, 2020Updated 5 years ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆181Oct 7, 2019Updated 6 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆19Mar 15, 2024Updated last year
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Anti-Malware application for Windows - Archive☆11Jul 18, 2019Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- ☆12Feb 10, 2019Updated 7 years ago
- Supporting resources and documentation for FLARE @ Google Summer of Code 2023☆16Feb 7, 2023Updated 3 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆43Mar 24, 2025Updated 11 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Jun 7, 2022Updated 3 years ago
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆25Mar 11, 2024Updated last year
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 11 months ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆26Dec 2, 2025Updated 3 months ago