A cross site scripting command and control notification server
☆23Apr 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for xss_bomb
Users that are interested in xss_bomb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- Ứng dụng blog viết bằng Python và framework Flask trong loạt bài Hướng dẫn lập trình Flask tại: https://thaitpham.com/huong-dan-lap-trinh…☆12Dec 8, 2022Updated 3 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 6 years ago
- 记录自己编写、修改的部分工具☆11Dec 5, 2020Updated 5 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 7 years ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- HackTheBox rich presence for Discord☆14May 30, 2024Updated last year
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆92Feb 22, 2026Updated 2 months ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Se trata de un análisis forense de un caso real, que por medio de una imagen, se obtiene una serie de datos que ayudan a una investigació…☆22May 11, 2018Updated 7 years ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 3 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆21Apr 3, 2024Updated 2 years ago
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Discord Gen Bot Tutorial☆10Jun 18, 2024Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 9 months ago
- ☆11Apr 12, 2025Updated last year
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆13Apr 26, 2022Updated 4 years ago
- Command line interface for our public API☆20Jan 9, 2023Updated 3 years ago
- CVE-2022-0847☆92Mar 9, 2022Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Concurrent HS256 JWT token brute force cracker, inspired by https://github.com/lmammino/jwt-cracker☆13Jan 21, 2022Updated 4 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆12Apr 8, 2026Updated last month