noxvix / Xss-Exploitation
A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP referer, user agent, and geographical details. This educational tool serves to illustrate the importance of proper cookie handling and security practices. Use responsibly.
☆35Updated last year
Alternatives and similar repositories for Xss-Exploitation:
Users that are interested in Xss-Exploitation are comparing it to the libraries listed below
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 8 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- PassBreaker☆61Updated last year
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆18Updated 10 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 11 months ago
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- ☆24Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Web Path Finder☆60Updated last year