ferreiraklet / airixssLinks
Finding XSS during recon
☆260Updated 2 years ago
Alternatives and similar repositories for airixss
Users that are interested in airixss are comparing it to the libraries listed below
Sorting:
- This is go CLI tool for send fast Multiple get HTTP request.☆275Updated 2 years ago
- List of reporting templates I have used since I started doing BBH.☆307Updated 9 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated last month
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆370Updated 5 years ago
- Js File Scanner☆168Updated 3 years ago
- My Priv8 Nuclei Templates☆321Updated last year
- ☆294Updated 2 years ago
- Automated tool for domains & subdomains gathering☆188Updated last year
- De-clutter a list of URLs☆343Updated 7 months ago
- ☆156Updated 2 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated 2 years ago
- ☆245Updated 4 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆243Updated 3 years ago
- ☆161Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆519Updated 4 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆314Updated last week
- This a adaption of tomnomnom's kxss tool with a different output format☆481Updated last year
- A collection oneliner scripts for bug bounty☆179Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆481Updated 2 years ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆214Updated last year
- ☆135Updated 3 years ago
- My small collection of reports templates☆82Updated 5 years ago
- Customisable and automated HTTP header injection☆253Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆282Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆108Updated 3 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆289Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆271Updated last year
- Jeeves SQLI Finder☆218Updated 3 years ago
- ☆127Updated 3 years ago
- ☆113Updated 2 years ago