noxvix / Xss-ExploitationLinks
A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP referer, user agent, and geographical details. This educational tool serves to illustrate the importance of proper cookie handling and security practices. Use responsibly.
☆36Updated 2 years ago
Alternatives and similar repositories for Xss-Exploitation
Users that are interested in Xss-Exploitation are comparing it to the libraries listed below
Sorting:
- PassBreaker☆64Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 4 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Hacking with PasteJacking technique☆22Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Mass bruteforce authentication of common services with common credentials.☆51Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- POC exploit for CVE-2015-10141☆30Updated 3 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 8 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆52Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆46Updated 7 years ago
- ☆24Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 11 months ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year