cross site scripting framework plugin for metasploit
☆17Aug 23, 2012Updated 13 years ago
Alternatives and similar repositories for xssf
Users that are interested in xssf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Jekyll + Heroku + Unicorn = Blazingly fast blogging☆53Nov 17, 2016Updated 9 years ago
- Source code for 'Pro Python System Administration' by Rytis Sileika☆13Mar 28, 2017Updated 8 years ago
- ☆12Aug 1, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- DockerFiles for Docker Containers☆16Sep 2, 2017Updated 8 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 11 years ago
- A Frida powered testing library designed to assist with security assesments of iOS applications written in Swift 5.☆17Apr 9, 2021Updated 4 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 10 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tools to extract raw system counters from atop, aggregate them to generate high level performance metrics, whose are then injected into a…☆22Sep 17, 2021Updated 4 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- A script containing several modules designed to help you set up your server as you want it.☆79Oct 24, 2014Updated 11 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Feb 13, 2025Updated last year
- CSRF Scanner Extension for Burp Suite Pro☆20Jun 5, 2018Updated 7 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- 爆破字典☆16Nov 15, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19Apr 11, 2017Updated 8 years ago
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆33Jul 9, 2017Updated 8 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Share Code is an Extension for Visual Studio Code. You can find it on marketplace.☆34Nov 16, 2022Updated 3 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- Source code for 'Beginning Python Games Development, Second Edition' by Will McGugan and Harrison Kinsley☆27May 31, 2017Updated 8 years ago
- simple webui for ngrok☆21Nov 6, 2016Updated 9 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago