blackhatethicalhacking / XSSRocketLinks
XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.
☆135Updated 7 months ago
Alternatives and similar repositories for XSSRocket
Users that are interested in XSSRocket are comparing it to the libraries listed below
Sorting:
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆122Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆67Updated 8 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- ☆57Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆149Updated 6 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆115Updated 5 months ago
- Here Are Some Bug Bounty Resource From Twitter☆95Updated 4 months ago
- ☆119Updated last year
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆41Updated 9 months ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆81Updated 3 months ago
- ☆38Updated 3 weeks ago
- Collect XSS vulnerable parameters from entire domain.☆151Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆233Updated 8 months ago
- ☆163Updated 7 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆65Updated 3 months ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆154Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 8 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆247Updated 2 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆103Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 11 months ago
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆102Updated 7 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆136Updated 2 weeks ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆209Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆55Updated 10 months ago
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆15Updated 10 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆194Updated 5 months ago