Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
-
Updated
Oct 3, 2023 - JavaScript
Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
Session Hijacking Visual Exploitation
OWASP PTK - application security browser extension.
A web application for generating custom XSS payloads
Foxss is a simple php based penetration Testing Tool.Currently it will help to find XSS vulnerability in websites.
Hackable website for teaching/training purposes. Includes my undergraduate thesis.
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Web Application Security Labs in Cybersecurity
The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.
An XSS reverse shell to control any website remotely using web sockets, along with an HTTP server to capture data
Detector of Vulnerable Input - XSS Cross Site Scripting - Payload Automation - Exploit Vulnerable Input
XSS ATTACK COOKIE INFO
xss vulnerable chat used to learn how to perform and protect against xss attacks
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
XSS Testing Page
CTF challenge based on the IT Security course of the Adolfo Ibáñez University 2024/1. Mix of SQL Injection, XSS, Cryptography and Session Cookie hijacking.
This chrome extension aims at attacking different websites using SQL injection or XSS by selecting the text fields on the webpage using the extension and selecting the type of attack.
simple implementasion of social engineering from xss
A web application demonstrating the three types of XSS attacks (DOM, Persistent, Reflective) and how to prevent them
Add a description, image, and links to the xss-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the xss-exploitation topic, visit your repo's landing page and select "manage topics."