burpsuite extension
☆14Feb 1, 2023Updated 3 years ago
Alternatives and similar repositories for xssbughunter
Users that are interested in xssbughunter are comparing it to the libraries listed below
Sorting:
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- WHY?☆18Sep 4, 2016Updated 9 years ago
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- XSS Hunter correlated injection API guide☆21Mar 24, 2016Updated 9 years ago
- T0ngMystic复现漏洞并提供POC或EXP(vulnerabilitu_list`s POC or EXP by T0ngMystic)☆25Jun 28, 2024Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- ☆65Jul 6, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- bounty collection☆41Sep 1, 2024Updated last year
- sideloading PoC using onedrive.exe & version.dll☆92Oct 30, 2025Updated 4 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Jan 9, 2023Updated 3 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Mar 1, 2026Updated last week
- ☆13Apr 2, 2023Updated 2 years ago
- ☆35Aug 2, 2022Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆43Jul 13, 2023Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- ☆38Dec 10, 2023Updated 2 years ago
- ☆40Jul 24, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆12Feb 28, 2025Updated last year
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago