noxvix / Xss-ExploitationLinks
A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP referer, user agent, and geographical details. This educational tool serves to illustrate the importance of proper cookie handling and security practices. Use responsibly.
☆36Updated 2 years ago
Alternatives and similar repositories for Xss-Exploitation
Users that are interested in Xss-Exploitation are comparing it to the libraries listed below
Sorting:
- PassBreaker☆63Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last month
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Hacking with PasteJacking technique☆22Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul …☆62Updated last year
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- Web Path Finder☆61Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 11 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆48Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago