tbhaxor / pt-jsfpLinks
Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course
☆16Updated 4 years ago
Alternatives and similar repositories for pt-jsfp
Users that are interested in pt-jsfp are comparing it to the libraries listed below
Sorting:
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- ☆29Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Pentest stuff☆49Updated 2 years ago
- ☆19Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Updated 8 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Updated 2 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated last week
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆54Updated 10 months ago
- Journey to Try Harder !!!☆32Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Additional Resources For Securing The Stack Tutorials☆40Updated 7 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- random notes☆46Updated 5 months ago
- Burp extension for quickly copying request/response data.☆31Updated 4 months ago
- A Complete SubDomain Enumeration Tool☆25Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago
- ☆76Updated 5 years ago
- ☆15Updated 4 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- AWS Security Checks☆40Updated 7 years ago
- ☆38Updated 4 years ago