Neuro0x00 / NeuroPwn
An advanced XSS vulnerability scanner.
☆11Updated last month
Alternatives and similar repositories for NeuroPwn:
Users that are interested in NeuroPwn are comparing it to the libraries listed below
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- Grep subdomains from web pages.☆42Updated last month
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- ☆58Updated 4 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- Private Nuclei Templates☆97Updated last month
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆53Updated 2 months ago
- A Powerful Recon Engine☆61Updated 4 months ago
- ☆118Updated last year
- ☆9Updated 5 months ago
- ☆26Updated last week
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 5 months ago
- ☆107Updated 2 weeks ago
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆96Updated 6 months ago
- shef - extract/scrape IPs from shodan without any API key☆46Updated 2 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- ☆100Updated last month
- ☆20Updated 6 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆94Updated 6 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆39Updated last week
- SubOwner - A Simple tool check for subdomain takeovers.☆109Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆108Updated 3 months ago
- ☆158Updated 5 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated last month
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- ☆11Updated 6 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆87Updated 7 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆30Updated 7 months ago