Tool for test XSS vulnerabilities of a site
☆18Apr 1, 2018Updated 7 years ago
Alternatives and similar repositories for Not-XSSer
Users that are interested in Not-XSSer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Simple HTTP Pull Botnet with a very cool Web Based C&C Panel☆40Dec 28, 2020Updated 5 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- ☆12Jul 4, 2024Updated last year
- ☆17Aug 3, 2021Updated 4 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- BugSquasher Bug Bounty Tools List☆21Feb 2, 2023Updated 3 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Disables LibOemCrypto.so on rooted devices to bypass DRM restrictions and allow e.g. Netflix, My5 playbacka☆10Dec 20, 2020Updated 5 years ago
- python based latest zombie bot v.14☆18Mar 23, 2021Updated 5 years ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Feb 18, 2017Updated 9 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- A tool that can take a URL or list of URL and prints back SAML consume URL.☆35Feb 4, 2019Updated 7 years ago
- Module to use Playready with Python☆11Jun 23, 2022Updated 3 years ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- MSF moudle jboss invoke deploy getshell Exploit & Jboss jmx-console getshell exploit☆22Apr 4, 2019Updated 6 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- ☆12Aug 20, 2020Updated 5 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Directory transversal to remote code execution☆70Oct 15, 2019Updated 6 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆228Aug 22, 2017Updated 8 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- ☆19Apr 29, 2019Updated 6 years ago