hoodoer / postBasedXSS
Demo of various ways to exploit post based reflected XSS
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for postBasedXSS
- Lexmark CVE-2023-26067☆22Updated last year
- tool that generates bypasses for open redirects☆48Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆11Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆22Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 3 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆36Updated 2 years ago
- ☆23Updated last year
- Bcheck scripts for Burp☆23Updated 3 months ago
- CVE-2022-41040 nuclei template☆18Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated 10 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated 9 months ago
- ☆19Updated 2 months ago
- Chameleon Wordlists☆14Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- ☆26Updated 2 years ago
- ☆33Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 4 years ago
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- Manage attack surface data on Elasticsearch☆20Updated 11 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated 9 months ago
- Template Nuclei SSTI☆28Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆15Updated 6 months ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆22Updated 8 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆24Updated 9 months ago
- Make better use of the embedded browser that comes by default with Burp☆39Updated 10 months ago