Javascript payload that inject a malicious payload into the copy-buffer of the victim
☆37May 25, 2018Updated 7 years ago
Alternatives and similar repositories for xss-to-rce
Users that are interested in xss-to-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆29May 14, 2019Updated 6 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 5 months ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Notes and Commands for CTFs☆24Apr 28, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆37Feb 12, 2018Updated 8 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- A Web-UI for subdomain enumeration (subfinder)☆55Jun 5, 2020Updated 5 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- Stealthy Stand Alone PHP Web Shell☆33Sep 12, 2019Updated 6 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆37May 31, 2023Updated 2 years ago
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated 2 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 5 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- A simple http server built with Rust☆12Feb 21, 2021Updated 5 years ago
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- ☆10Aug 13, 2018Updated 7 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Testing tools for Oracle Forms☆13Oct 23, 2025Updated 6 months ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago