rohit-sonii / Escalating-Self-XSS-to-Account-TakeoverView external linksLinks
This repository contains complete source code for setting up the environment and exploit code for the vulnerability.
☆19Mar 23, 2023Updated 2 years ago
Alternatives and similar repositories for Escalating-Self-XSS-to-Account-Takeover
Users that are interested in Escalating-Self-XSS-to-Account-Takeover are comparing it to the libraries listed below
Sorting:
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- A Burp Suite extension to parse Content-Transfer-Encoding: quoted-printable emails received in Burpcollaborator's SMTP☆30Aug 8, 2020Updated 5 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- ☆13Oct 24, 2024Updated last year
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Feb 19, 2019Updated 6 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- Fuzz every path with goky☆15Jan 4, 2024Updated 2 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 4 years ago
- ☆21Mar 4, 2021Updated 4 years ago
- This tool allows you to find ssti vulnerability with ease!☆21Sep 3, 2022Updated 3 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆26Jan 6, 2021Updated 5 years ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆11May 8, 2020Updated 5 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated last year
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- Build, release and deploy Flutter apps☆11Dec 14, 2025Updated 2 months ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago