mohammadkamrani / Selenium-Brute-ForceView external linksLinks
A simple python script for doing brute-force attack using selenium.
☆14Apr 15, 2024Updated last year
Alternatives and similar repositories for Selenium-Brute-Force
Users that are interested in Selenium-Brute-Force are comparing it to the libraries listed below
Sorting:
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- Start an bruteforce attack using a combolist.☆10Jun 1, 2022Updated 3 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Files used for various testing methodologies.☆13Mar 6, 2017Updated 8 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 8 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆11Oct 9, 2016Updated 9 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 7 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 3 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆15Sep 21, 2011Updated 14 years ago
- ☆13Jan 19, 2019Updated 7 years ago
- A simple but useful bot that automatically sends an email to a list of email directions☆14Aug 20, 2019Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Small golang program for ssh brute force attacks☆11Jan 23, 2019Updated 7 years ago
- Google Phishing with ESP8266☆16Jul 28, 2024Updated last year
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆19Dec 15, 2025Updated last month
- ActiveMime File Format Documentation☆18Jun 28, 2021Updated 4 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- Implements Windows API hooks in modern C++☆17Aug 6, 2018Updated 7 years ago
- Turns a list of URLs into hostnames.☆16Updated this week
- Nuclei templates to run on urls☆17Sep 14, 2023Updated 2 years ago
- Kyuubi is a Telegram bot written in Golang. a multipurpose telegram bot to use in recon process. Don't you have access to terminal to do …☆12Oct 11, 2023Updated 2 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Example RPC service for blog post☆17Jul 13, 2019Updated 6 years ago