script file <URL> <payload>
- URI. URI parameter and expected exploited response text has to be provided inside the script file
filename.py www.example.com "'1=1"
Reverse shell script writern in PHP (replace you reverse shell IP and listerning port)
Scripts which exploits the copy event handler
Scripts which uses expect command to get a intertive session on a restricted web shell expect_su.sh password command
Script which exploits XSS to steal cookies
Scripts which exploits XSS to steal username and password (by abusing the password managers autofill functionality)
Script which exploits the XSS vulnerability to bypass CSRF prevention to do CSRF attack
Open the script and feed the filedata variable with base64 encoded data of the binary which need to be downloaded just by visiting the page (tweak as required)
Python based script, upon execution will encrypt the files avaialble on the execution directory and leave a key to decrypt