everythingBlackkk / hackJSLinks
To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extract embedded links and subdomains.
☆20Updated 7 months ago
Alternatives and similar repositories for hackJS
Users that are interested in hackJS are comparing it to the libraries listed below
Sorting:
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆90Updated 11 months ago
- ☆61Updated 6 months ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Updated 2 years ago
- ☆23Updated 4 months ago
- ☆15Updated 11 months ago
- ☆21Updated 2 years ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated 4 months ago
- Bug Bounty Platforms☆26Updated last year
- This repo contains Machines and Notes for practicing for EJPTv2 & CJCA exams☆145Updated 3 weeks ago
- ☆19Updated last year
- WAPTLab - Web Application Penetration Testing Lab☆80Updated 2 months ago
- ☆91Updated last month
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Updated last year
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆115Updated last year
- ☆26Updated 3 years ago
- ☆15Updated 2 years ago
- Offsec Practice Labs is a curated training arsenal for hands-on prep across eCPPTv3, OSCP, and CPTS.☆69Updated 3 weeks ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆58Updated 5 months ago
- ☆150Updated last year
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆65Updated 2 years ago
- ☆226Updated 2 weeks ago
- ☆163Updated 11 months ago
- ☆23Updated last year
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆34Updated 5 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆359Updated 8 months ago
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆40Updated 6 months ago
- ☆138Updated last year
- ☆165Updated 2 weeks ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year
- My Private Bug Hunting Methodology☆316Updated last year