Tool for test XSS vulnerabilities of a site
☆18Apr 1, 2018Updated 7 years ago
Alternatives and similar repositories for Not-XSSer
Users that are interested in Not-XSSer are comparing it to the libraries listed below
Sorting:
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 8 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Feb 18, 2017Updated 9 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- BugSquasher Bug Bounty Tools List☆20Feb 2, 2023Updated 3 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- python based latest zombie bot v.14☆18Mar 23, 2021Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Mar 8, 2021Updated 4 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- MSF moudle jboss invoke deploy getshell Exploit & Jboss jmx-console getshell exploit☆22Apr 4, 2019Updated 6 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 6 years ago
- Android Digital Bank Vulnerable Mobile App☆37Aug 15, 2015Updated 10 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- ☆58Dec 4, 2020Updated 5 years ago