ShubhamJagtap2000 / Cross-site-Scripting
π Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
β13Updated 6 months ago
Alternatives and similar repositories for Cross-site-Scripting:
Users that are interested in Cross-site-Scripting are comparing it to the libraries listed below
- π½ Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.β22Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β27Updated last year
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,β¦β21Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ38Updated 6 months ago
- Cross Site Scripting ( XSS ) Vulnerability Payload Listβ22Updated 4 years ago
- πΊ A map of OSINT tools.β18Updated last year
- Some Dorking resourcesβ34Updated 7 months ago
- Programs I Made while learning python for pentesters.β18Updated 2 years ago
- DNSrecon tool with GUI for Kali Linuxβ57Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, inβ¦β13Updated 3 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ22Updated 3 years ago
- xdebug 2.5.5 RCE exploitβ30Updated 2 months ago
- Ultimate Google Dork Lists OSWP top 10β54Updated 7 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive β¦β14Updated last year
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff aboutβ¦β45Updated 10 months ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLISTβ15Updated last year
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacksβ13Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, β¦β34Updated last year
- Payloads and Listsβ20Updated 5 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designedβ¦β61Updated last month
- A tool designed to analyse email headersβ33Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)β18Updated 2 years ago
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord serverβ77Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ21Updated 2 years ago
- Simple recon tool automates your recon processβ16Updated last year
- Yet another web recon toolβ62Updated last year
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ24Updated 3 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.β16Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.β66Updated 6 months ago
- A BASH Script to automate the installation of the most popular bug bounty toolsβ19Updated 5 months ago