JacobReynolds / xssHunterExtension
Chrome Extension for XSS Hunter Payloads
☆41Updated 8 years ago
Alternatives and similar repositories for xssHunterExtension:
Users that are interested in xssHunterExtension are comparing it to the libraries listed below
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- ☆36Updated 5 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆27Updated 6 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Send notifications if a new program is published on HackerOne using Pushbullet☆26Updated 7 years ago
- ☆7Updated 7 years ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- PHP tool to test XSS☆23Updated 5 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Updated 6 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 5 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 7 years ago
- Alpha version code of Recon UI☆14Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Scripts for Deploying new server☆48Updated 6 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Nodejs application intentionally vulnerable to SSRF☆41Updated last year
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- A horizontal and vertical web content enumerator☆51Updated 6 years ago
- Simple Server Side Request Forgery services enumeration tool.☆54Updated 6 years ago
- XSS Payloads☆49Updated 9 years ago
- HackerOne Public Disclosure Slack Bot☆20Updated 2 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆47Updated 2 years ago