hacktricks
browser-sec-whitepaper
hacktricks | browser-sec-whitepaper | |
---|---|---|
6 | 1 | |
8,221 | 276 | |
2.4% | - | |
9.8 | 10.0 | |
2 days ago | over 6 years ago | |
Python | ||
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hacktricks
- Where do you look for help when doing ctf
-
Desktop background changed suddenly
Honestly when I saw desktopimgdownldr.exe I thought LOLBAS as well. https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/basic-cmd-for-pentesters.md
- Best way to learn advanced DOM XSS.
-
Trying to find a username and password to access a virtual machine to solve a CTF?
shot in the dark.... but the port 135 being open might be interesting?
- An Effective Pentesting Methodology
- Comprehensive Guide to Pen-Testing
browser-sec-whitepaper
-
Best way to learn advanced DOM XSS.
IMHO, understanding XSS means understanding the browser security model. Cure53 published a great browser security whitepaper that gives an overview about how browser security works in general an in detail. Although the document is from 2017 it is worth reading.
What are some alternatives?
dirsearch - Web path scanner
xss-demo - Simple flask website to demonstrate reflected and stored XSS attacks.
Lockdoor-Framework - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).