coffinxp / loxsLinks
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
☆1,508Updated last month
Alternatives and similar repositories for loxs
Users that are interested in loxs are comparing it to the libraries listed below
Sorting:
- ☆544Updated 2 weeks ago
- recon for bug hunters☆859Updated 2 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,811Updated 5 months ago
- ☆472Updated 5 months ago
- how to look for Leaked Credentials !☆1,022Updated last year
- A modern tool written in Python that automates your xss findings.☆470Updated 2 years ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆720Updated 2 months ago
- A Modern Framework for Bug Bounty Hunting☆650Updated 11 months ago
- A simple tool for bypassing file upload restrictions.☆890Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆550Updated this week
- ☆582Updated 5 months ago
- 1337 Wordlists for Bug Bounty Hunting☆924Updated this week
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,561Updated 3 years ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆882Updated last month
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,409Updated 6 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆414Updated last year
- ☆834Updated last month
- An insane list of all dorks taken from everywhere from various different sources.☆763Updated last month
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆356Updated 8 months ago
- ☆225Updated last week
- Header Exploitation HTTP☆704Updated this week
- A repository that includes all the important wordlists used while bug hunting.☆1,370Updated 2 years ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆832Updated 4 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆715Updated this week
- Here Are Some Popular Hacking PDF☆623Updated 3 months ago
- These are my checklists which I use during my hunting.☆842Updated 2 years ago
- ☆624Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,475Updated 7 months ago
- Nuclei Templates Collection☆1,068Updated last month
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆752Updated 2 years ago