jkingsman / bishop
Hunt for vulnerable websites as you browse.
☆130Updated 7 years ago
Alternatives and similar repositories for bishop:
Users that are interested in bishop are comparing it to the libraries listed below
- The databases, API's and managers behind https://websecweekly.org☆50Updated 9 years ago
- Chrome extension that spots web accessible Git repos.☆25Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆164Updated last year
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆190Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆120Updated 9 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆79Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- Tool to help with the exploitation of web application race conditions☆181Updated 6 years ago
- A small python script to check for Cross-Site Tracing (XST)☆136Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆94Updated 6 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆132Updated 8 years ago
- ☆179Updated 11 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- A security tool to fingerprint PNG libraries used by web applications☆80Updated 5 years ago
- An automated XSS payload generator written in python.☆319Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- XSS exploitation tool - access victims through HTTP proxy☆158Updated 10 years ago
- ☆22Updated 8 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- ☆53Updated 8 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 4 years ago
- Remotely test password strength of WordPress bloging software☆107Updated 8 years ago