Simple script to test for clickjacking
☆23Jun 21, 2021Updated 4 years ago
Alternatives and similar repositories for clickjack
Users that are interested in clickjack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆48Aug 12, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆25Dec 17, 2021Updated 4 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- ☆15May 30, 2025Updated 9 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- ☆19Dec 1, 2025Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆31Aug 13, 2025Updated 7 months ago
- hostinject (Host Header Injection) Tool is a Python script that allows you to perform host header injection vulnerability testing on a ta…☆29Jun 29, 2023Updated 2 years ago
- Big Dorker☆14Oct 18, 2024Updated last year
- Access the query parameters of a URI, just like $_GET in PHP.☆18Jan 12, 2026Updated 2 months ago
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- A script for installing custom patches in Ubuntu Touch devices.☆11Oct 7, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 5 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- CVE-2022-41040 nuclei template☆19Oct 2, 2022Updated 3 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆26Apr 6, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆24Dec 31, 2025Updated 2 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆13Apr 30, 2020Updated 5 years ago
- A tool that uses public proxies to find and scan sites for sql injection vulnerability.☆13Oct 16, 2025Updated 5 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- X-ddos666 is a Insane DDOS tool with HTTP/HTTPS PROXY REQUIREMENT {OVER 500 IP PROXY}☆13Oct 16, 2025Updated 5 months ago