Cybersecurity-Ethical-Hacker / xssuccessor
⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.
☆53Updated 2 months ago
Alternatives and similar repositories for xssuccessor:
Users that are interested in xssuccessor are comparing it to the libraries listed below
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 2 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated last week
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated 2 months ago
- A Powerful Recon Engine☆61Updated 4 months ago
- A collection of config files for linux focusing on hackthebox theme☆41Updated 3 months ago
- ☆43Updated 2 weeks ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated last month
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆75Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆108Updated 3 months ago
- A list of all Active Directory machines from HackTheBox☆57Updated last month
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- ☆48Updated 9 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆41Updated 2 weeks ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆39Updated last week
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆72Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆85Updated 7 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆109Updated 5 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆70Updated last week
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 6 months ago
- My notes containing the Certified Red Team Professional Course☆47Updated 6 months ago
- The tool 𝗲𝗻𝘂𝗺𝘅 is a framework built for Kali Linux that uses a plethora of existing pentesting tools as plugins in order to simplify…☆38Updated 2 months ago
- Bug Bounty Web and API Payloads☆34Updated 4 months ago