Bypass XSS Reflected Cross-site scripting
☆33Oct 15, 2015Updated 10 years ago
Alternatives and similar repositories for compaXSS
Users that are interested in compaXSS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- Simple Webshell Scanner☆55Jan 11, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lightweight static site generator in PHP without a database.☆17Sep 15, 2015Updated 10 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- ♠ A Python module for converting strings into unicode playing cards ♣☆50Mar 7, 2023Updated 3 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆22Oct 13, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Mar 6, 2026Updated last month
- Monitor an ECS Deployment☆16Feb 28, 2026Updated 2 months ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- They Can't Stop us☆10Nov 29, 2016Updated 9 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Adama - Command and Invoker Pattern For Getting Things Done☆13Aug 10, 2023Updated 2 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 12 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Web-based Source Code Vulnerability Scanner☆21Jul 8, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆13Oct 26, 2018Updated 7 years ago
- java unserialize vulnerability payload☆21Apr 20, 2019Updated 7 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago