X-Vector / XSS_Bypass
XSS Bypass
☆28Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for XSS_Bypass
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Exploiting the xmlrpc.php on all WordPress versions☆23Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆50Updated 3 years ago
- ☆47Updated 2 years ago
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- The scripts I write to help me on my bug bounty hunting☆120Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆58Updated 2 years ago
- XSS Finder Via SSTI☆54Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- ☆69Updated 6 months ago
- IIS shortname scanner + bruteforce☆49Updated 9 months ago
- Subdomains enumeration, various scans and testing of some vulnerabilities.☆75Updated 6 months ago
- Advanced Reconnaissance and Web Application Discovery☆75Updated 2 years ago
- The fastest way to setup XSSHunter. It has options for the official and Discord/Slack Forks☆40Updated 8 months ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Updated 7 months ago
- Here Are Some Bug Bounty Resource From Twitter☆85Updated 6 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- ☆36Updated this week
- ☆57Updated 3 months ago
- ☆64Updated last year
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- Simple bash Oneliners to make life easier☆61Updated 4 years ago
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆40Updated 2 years ago
- HTTP parameter discovery suite.☆60Updated 4 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆36Updated last year
- Describe how to use ffuf different options with examples☆80Updated last year
- ☆46Updated last year
- A solid recon tool I use personally.☆30Updated last year
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆38Updated 3 years ago