s0md3v / JShellLinks
JShell - Get a JavaScript shell with XSS.
☆528Updated 6 years ago
Alternatives and similar repositories for JShell
Users that are interested in JShell are comparing it to the libraries listed below
Sorting:
- kadimus is a tool to check and exploit lfi vulnerability.☆543Updated 4 years ago
- Search for Directory Traversal Vulnerabilities☆448Updated 3 weeks ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Updated 5 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆445Updated 6 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆320Updated 3 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆545Updated 4 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆553Updated 2 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆334Updated 4 years ago
- Auto Scanning to SSL Vulnerability☆634Updated 4 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Updated 5 years ago
- An automatic XSS discovery tool☆403Updated 7 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆431Updated last year
- Python 3.5+ DNS asynchronous brute force utility☆658Updated last year
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆299Updated 5 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆274Updated 4 years ago
- SQL Injection Exploitation Tool☆775Updated 6 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆285Updated 10 years ago
- Version 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).☆391Updated 6 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆363Updated 2 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆728Updated 6 years ago
- Free web-application vulnerability and version scanner☆574Updated 5 months ago
- Exploitation for XSS☆722Updated 3 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆409Updated 5 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆369Updated last year
- for mass exploiting☆604Updated 3 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,243Updated last year
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated 3 months ago