Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, accessing sensitive data, cookies, and even altering HTML content. Widespread due to input validation lapses.
☆71Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for Google-Dorks-for-Cross-site-Scripting-XSS
Users that are interested in Google-Dorks-for-Cross-site-Scripting-XSS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Every Nuclei template that has ever appeared on Github☆36Jun 2, 2022Updated 3 years ago
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- automatically crawl every URL and find cross site scripting (XSS)☆41Mar 22, 2022Updated 4 years ago
- You can Get useful information from Websites and do some bypasses like bypassing CloudFlare, Do a whois on websites,Find There Location, …☆16Jan 11, 2021Updated 5 years ago
- ☆20Dec 23, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 6 months ago
- For Phising Instagram and Other social medias....☆27Jan 29, 2024Updated 2 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆43Jun 28, 2022Updated 3 years ago
- Dorks for Bug Bounty Hunting☆186Jul 16, 2024Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆405May 21, 2025Updated 10 months ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- ☆10Jun 30, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 🤖 The Modern Port Scanner 🤖☆15Nov 5, 2024Updated last year
- This program scrapes followers' usernames from a specified Instagram account!☆11Jan 9, 2022Updated 4 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- ☆47Jan 14, 2024Updated 2 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated last year
- Harnessing ChatGPT for blockchain and crypto data analysis☆10Jun 10, 2024Updated last year
- advance web crawler to crawl urls from website using python.☆10Apr 24, 2023Updated 2 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- ☆36May 5, 2021Updated 4 years ago
- ☆18Mar 23, 2023Updated 3 years ago
- Bug-hunting Automation☆39Jun 11, 2023Updated 2 years ago
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SVG Images with XSS in them☆17Oct 5, 2023Updated 2 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆24Dec 18, 2024Updated last year
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 11 months ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year