s0md3v / JShellLinks
JShell - Get a JavaScript shell with XSS.
☆527Updated 6 years ago
Alternatives and similar repositories for JShell
Users that are interested in JShell are comparing it to the libraries listed below
Sorting:
- kadimus is a tool to check and exploit lfi vulnerability.☆539Updated 4 years ago
- Search for Directory Traversal Vulnerabilities☆446Updated last year
- A friend of SQLmap which will do what you always expected from SQLmap.☆444Updated 6 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆553Updated 2 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆541Updated 4 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆430Updated last year
- An automatic XSS discovery tool☆403Updated 7 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 4 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆319Updated 3 years ago
- A script to enumerate virtual hosts on a server.☆692Updated 7 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆363Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆283Updated 10 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago
- Repository for hosting my research papers☆510Updated last year
- Python 3.5+ DNS asynchronous brute force utility☆658Updated last year
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆299Updated 5 years ago
- SQL Injection Exploitation Tool☆767Updated 6 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆407Updated 5 years ago
- Exploitation for XSS☆720Updated 3 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆732Updated last year
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆274Updated 4 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆369Updated last year
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Free web-application vulnerability and version scanner☆573Updated 4 months ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Updated 5 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated 2 months ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- WebPwn3r - Web Applications Security Scanner.☆458Updated 3 years ago