yassinmohamed1111 / superxssView external linksLinks
Just A list Of Some Multilingual XSS Payloads and other weird ones i made
☆122Sep 28, 2025Updated 4 months ago
Alternatives and similar repositories for superxss
Users that are interested in superxss are comparing it to the libraries listed below
Sorting:
- PoC☆12Apr 7, 2025Updated 10 months ago
- ☆33Dec 10, 2024Updated last year
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 5 months ago
- command control framework☆30Updated this week
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Automate converting webshells into reverse shells.☆72Jan 19, 2026Updated 3 weeks ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated 2 weeks ago
- Android webviews and securiy☆23Sep 18, 2025Updated 4 months ago
- ☆12May 21, 2025Updated 8 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated last month
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆60Feb 5, 2026Updated last week
- A hoontr must hoont☆102Nov 27, 2025Updated 2 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆62Feb 2, 2026Updated last week
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆53Feb 2, 2026Updated last week
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Oct 6, 2023Updated 2 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Oct 5, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- ☆16Jul 31, 2021Updated 4 years ago
- A JavaScript Secret Finder tool.☆33Nov 3, 2025Updated 3 months ago
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF☆54Jul 28, 2025Updated 6 months ago
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 7 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- Adversary Simulation Framework☆39Aug 19, 2025Updated 5 months ago
- Let sliver use msf payload!☆25Mar 23, 2025Updated 10 months ago
- ☆21Apr 30, 2025Updated 9 months ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Windows Win32 Kernel Subsystem☆35Aug 23, 2025Updated 5 months ago
- Tool to parse subdomains from dmarc.live☆149Apr 19, 2024Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆339Sep 4, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A script for installing and switching multiple java versions on Linux x86_64, suitable for code audit workers.☆21Mar 2, 2024Updated last year