ShubhamJagtap2000 / Cross-site-ScriptingLinks
π Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
β13Updated last month
Alternatives and similar repositories for Cross-site-Scripting
Users that are interested in Cross-site-Scripting are comparing it to the libraries listed below
Sorting:
- π½ Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.β24Updated last year
- All In One, Fast, Easy Recon Toolβ87Updated 3 years ago
- A collection of pentesting web scannersβ33Updated last year
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)β26Updated 4 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resouβ¦β38Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapperβ91Updated 11 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurityβ64Updated 3 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,β¦β23Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.β70Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ25Updated 4 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The β¦β44Updated 3 years ago
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff aboutβ¦β54Updated last year
- Updated 6000 Sql Injection Google Dork 2021β40Updated 4 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLISTβ15Updated 2 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing reviβ¦β14Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ41Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.β42Updated 2 years ago
- An OSINT focused tool made with Nodejs!β99Updated 2 years ago
- This is a simple Cheat Sheet which can be helpful while pentestingβ50Updated 2 years ago
- A tool designed to analyse email headersβ37Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β79Updated last year
- A python script to perform dorks using DuckDuckGo search engine.β94Updated 6 years ago
- π This is a collection of hackingπ₯ and pentesting π§ scripts to help with enumeration, OSINT, exploitation and post exploitation automβ¦β180Updated last year
- DNSrecon tool with GUI for Kali Linuxβ60Updated 2 years ago
- Aline dork Automatorβ32Updated 3 years ago
- For beginners which zero knowledge on ethical hacking!β69Updated 4 years ago
- Complex OSINT Search Tools π΅οΈββοΈπ₯β167Updated 4 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitaβ¦β53Updated 6 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β105Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.β37Updated 2 years ago