fagun18 / web-vulnerability
Web Vulnerability Scanning and Exploitation Script
โ23Updated last year
Alternatives and similar repositories for web-vulnerability:
Users that are interested in web-vulnerability are comparing it to the libraries listed below
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, โฆโ39Updated last year
- Tool for automate bug hunting process ๐ --> ๐ญโ40Updated 8 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.โ134Updated 6 months ago
- a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THMโ9Updated last year
- This wil perform your full recon including some vulnerability scanning. Scriptjacker tool by Parth Narula.โ22Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible paโฆโ63Updated 8 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesโฆโ40Updated 2 years ago
- ๐ฅ๐ฎ๐ฑ๐ต๐ฒ is a tool that automatically enumerates subdomains, checks if they are live, and finds "Unauthenticated cache purge" and "Servโฆโ6Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.โ47Updated 3 weeks ago
- Here you can find mostly all disclosed h1 reportsโ25Updated 3 years ago
- โ41Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.โ46Updated last year
- โ70Updated 7 months ago
- Who needs authentication? This cache purge vulnerability finder doesn't!โ10Updated 2 years ago
- Python-based vulnerability detection tool for web applicationsโ17Updated 8 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ178Updated 4 months ago
- โ49Updated last year
- Tools and methods that I personally use for Recon and Exploitationsโ38Updated 2 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search โฆโ36Updated 4 months ago
- Reflector: A tool to check for reflected query parameter values.โ10Updated 2 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.โ45Updated 2 years ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working oโฆโ50Updated last year
- โ20Updated 5 months ago
- Follow this repo if you are taking CEH(Practical) Exam By Ec-Councilโ62Updated 3 years ago
- Collection of some pentesting and bugbounty resourcesโ43Updated 3 years ago
- ๐ XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.โ97Updated 7 months ago
- All in one web Recon appโ39Updated 10 months ago
- โ165Updated 9 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.โ110Updated 3 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.โ153Updated 11 months ago