MrPr0fessor / Google-Dorks-for-Cross-site-Scripting-XSSLinks
Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, accessing sensitive data, cookies, and even altering HTML content. Widespread due to input validation lapses.
☆63Updated 2 years ago
Alternatives and similar repositories for Google-Dorks-for-Cross-site-Scripting-XSS
Users that are interested in Google-Dorks-for-Cross-site-Scripting-XSS are comparing it to the libraries listed below
Sorting:
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆350Updated 8 months ago
- A quick bug bounty guide for beginners☆86Updated 8 months ago
- ☆222Updated 3 months ago
- ☆138Updated 11 months ago
- ☆149Updated 11 months ago
- ☆90Updated 2 weeks ago
- Bug Bounty Tools used on Twitch - Recon☆318Updated last year
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆164Updated last year
- ☆27Updated last year
- ☆161Updated 11 months ago
- ☆157Updated 3 weeks ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆228Updated last year
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆113Updated last year
- Dorks for Bug Bounty Hunting☆186Updated last year
- A modern tool written in Python that automates your xss findings.☆470Updated 2 years ago
- ☆28Updated last year
- ☆468Updated 5 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆81Updated 10 months ago
- ☆164Updated last year
- ☆541Updated last week
- A collection of notes for bug bounty hunting☆279Updated 2 years ago
- Here you can find mostly all disclosed h1 reports☆17Updated 6 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆412Updated last year
- ☆167Updated last year
- My Private Bug Hunting Methodology☆314Updated last year
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆57Updated 5 months ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated 4 months ago
- SQL Injection Vulnerability Scanner made with Python☆381Updated 10 months ago
- ☆25Updated 3 years ago
- ☆46Updated 2 years ago