Session Hijacking Visual Exploitation
-
Updated
Mar 7, 2024 - JavaScript
Session Hijacking Visual Exploitation
💀 PyInstaCrack - IG's executioner 🔪. Weaponized Python suite shredding security layers with military-grade brute-force 🚀, AI-powered bypass 🧠, and quantum-speed vectors ⚡. Surgical strikes, terrifying efficiency ☠️. Not for posers.
A Deliberately Insecure Web Application
PHP Cookie Stealing Scripts for use in XSS
Powershell scripts for scanning ASP.NET apps
A tiny flask app for helping pentesters and bug hunters in XSS, Session Hijacking, Session Riding and Cookie Thieve.
MySQLSessionHandler Class (PHP 7.1)
The Device Fingerprint Generator is a web-based tool that uniquely identifies devices based on various browser and system attributes. By leveraging JavaScript and web APIs, it creates a consistent fingerprint that can be used for analytics, fraud prevention, and security purposes.
Demo tool for hijacking TCP sessions
Demonstrating exploitation of missing HTTP cookie flags
CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber threats in a safe, isolated environment. Ideal for researchers, developers, and educators to test and enhance network security.
Notes & misc taken from Complete Ethical Hacking Bootcamp 2021: ZTM(ARCHIVED) and EC-Council's CodeRed
Python server captures inbound HTTP connections along with its respective cookies
KerioMaker (VPN Provider) Session Hijacker and upload to third-party site, You can convert this script into an executable file and send it to your target
Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.
This is a vulnerable web application I developed for my Database Security class at Boston University. It contains possible IDOR and session hijacking attacks in a pseudo-realistic banking web app. The application is built using the LAMP stack.
Immerse yourself in a practical hacking exercise to gain valuable experience with prevalent security exploits. Explore six key vulnerabilities, including SQL injection, session hijacking, username enumeration, IDOR, XSS, and CSRF, for a comprehensive cybersecurity learning experience.
Add a description, image, and links to the session-hijacking topic page so that developers can more easily learn about it.
To associate your repository with the session-hijacking topic, visit your repo's landing page and select "manage topics."