zsitro / XSS-test-dump
Just a copy-paste XSS test file
☆23Updated 12 years ago
Alternatives and similar repositories for XSS-test-dump:
Users that are interested in XSS-test-dump are comparing it to the libraries listed below
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆35Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- A repository of knowledge accumulated that may help in the other BTN challenge repos☆13Updated 8 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- Hack your friend's online MMORPG game - specific focus, csrf/xss attacks☆91Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆119Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago
- ☆78Updated 9 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- ☆25Updated 7 years ago
- ☆56Updated 7 years ago
- ☆28Updated 3 years ago