S1N6H / Custom-XSSLinks
☆11Updated last year
Alternatives and similar repositories for Custom-XSS
Users that are interested in Custom-XSS are comparing it to the libraries listed below
Sorting:
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆38Updated last week
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- ☆80Updated last year
- my nuclei templates☆41Updated last year
- ☆29Updated last year
- ☆60Updated 11 months ago
- Private Nuclei Templates☆100Updated 8 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Updated 8 months ago
- ☆42Updated 4 years ago
- A Series of Tweets☆15Updated last year
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆61Updated 4 months ago
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆49Updated 10 months ago
- ☆51Updated 4 months ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 6 months ago
- ☆100Updated 7 months ago
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated last year
- BugSquasher Bug Bounty Tools List☆20Updated 2 years ago
- This script can be used to find html forms in the list of endpoints/urls.☆49Updated last year
- ☆37Updated 9 months ago
- ☆44Updated 10 months ago
- output burp body only and auto pretiffy☆18Updated 6 months ago
- My Notes on Regular Expressions for AWAE/OSWE.☆36Updated 2 years ago
- ☆22Updated last year
- A passive way to find backups/ sensitive information.☆89Updated 4 months ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆43Updated 2 years ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated last year
- Contains nuclei templates for security testing and POCs.☆17Updated last year
- ☆26Updated last year
- ☆17Updated 2 years ago