yassinmohamed1111 / superxssView external linksLinks
Just A list Of Some Multilingual XSS Payloads and other weird ones i made
☆122Sep 28, 2025Updated 4 months ago
Alternatives and similar repositories for superxss
Users that are interested in superxss are comparing it to the libraries listed below
Sorting:
- PoC☆12Apr 7, 2025Updated 10 months ago
- ☆33Dec 10, 2024Updated last year
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 5 months ago
- command control framework☆29Feb 8, 2026Updated last week
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- Automate converting webshells into reverse shells.☆72Jan 19, 2026Updated 3 weeks ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated 2 weeks ago
- Android webviews and securiy☆23Sep 18, 2025Updated 4 months ago
- ☆12May 21, 2025Updated 8 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆60Feb 5, 2026Updated last week
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated last month
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆62Feb 2, 2026Updated last week
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆53Feb 2, 2026Updated last week
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Oct 6, 2023Updated 2 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Oct 5, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- A JavaScript Secret Finder tool.☆35Nov 3, 2025Updated 3 months ago
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- ☆16Jul 31, 2021Updated 4 years ago
- 10–11 января 2024 ⋅ Олимпиада по защите информации☆18May 14, 2024Updated last year
- Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF☆54Jul 28, 2025Updated 6 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- Adversary Simulation Framework☆39Aug 19, 2025Updated 5 months ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- ☆12Aug 24, 2025Updated 5 months ago
- ☆17May 29, 2018Updated 7 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- ☆21Apr 30, 2025Updated 9 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Let sliver use msf payload!☆25Mar 23, 2025Updated 10 months ago
- Windows Win32 Kernel Subsystem☆35Aug 23, 2025Updated 5 months ago
- Tool to parse subdomains from dmarc.live☆149Apr 19, 2024Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆339Sep 4, 2024Updated last year
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 3 months ago