An automated XSS payload generator written in python.
☆314Jun 2, 2016Updated 9 years ago
Alternatives and similar repositories for xssless
Users that are interested in xssless are comparing it to the libraries listed below
Sorting:
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Cloudflare DNS Enumeration Tool for Pentesters☆523Aug 6, 2022Updated 3 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,543Dec 7, 2022Updated 3 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 11 years ago
- Correlated injection proxy tool for XSS Hunter☆259Dec 26, 2022Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- It's bloody scantastic☆239Jun 21, 2022Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- Exploitation for XSS☆729Aug 5, 2021Updated 4 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆158Nov 29, 2018Updated 7 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆872Aug 24, 2017Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Jun 11, 2016Updated 9 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago