everythingBlackkk / hackJSLinks
To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extract embedded links and subdomains.
☆17Updated last week
Alternatives and similar repositories for hackJS
Users that are interested in hackJS are comparing it to the libraries listed below
Sorting:
- ☆50Updated 9 months ago
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆76Updated 4 months ago
- ☆19Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆120Updated last year
- ☆15Updated last year
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆57Updated last year
- ☆27Updated 2 years ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 6 months ago
- ☆18Updated last year
- ☆13Updated 3 months ago
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆31Updated 3 weeks ago
- Bug Bounty Roadmap☆34Updated last year
- ☆21Updated 10 months ago
- Bug Bounty Platforms☆25Updated 8 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆84Updated last year
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆58Updated 8 months ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆48Updated 8 months ago
- ☆9Updated 2 years ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆50Updated 2 months ago
- ☆23Updated last year
- Some creative ideas about my scanner automation :)☆8Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆133Updated last month
- ☆24Updated 2 years ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆44Updated last year
- ☆52Updated last year
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايح تويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Updated 3 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆19Updated 6 months ago
- ☆20Updated 7 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Rust☆38Updated last year