haroonawanofficial / XSSInspector-SecurityToolkit-AI-MLLinks
World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect Reflected, Stored, DOM, and Blind (XSS) vulnerabilities in servers/apps at RFC design, forms, crawls, and through advanced AI techniques with deep and reinforcement learning, (NLP) and automatic payload generat…
☆27Updated 11 months ago
Alternatives and similar repositories for XSSInspector-SecurityToolkit-AI-ML
Users that are interested in XSSInspector-SecurityToolkit-AI-ML are comparing it to the libraries listed below
Sorting:
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆55Updated 2 months ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago
- ☆57Updated 10 months ago
- ☆37Updated 3 months ago
- A passive way to find backups/ sensitive information.☆84Updated this week
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆43Updated 4 months ago
- Grep subdomains from web pages.☆42Updated 5 months ago
- ☆40Updated 11 months ago
- A fast subdomain takeover tool☆80Updated last year
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆28Updated 11 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆157Updated last month
- ☆166Updated 8 months ago
- ☆40Updated 11 months ago
- ☆66Updated 4 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆72Updated 5 months ago
- ☆65Updated 2 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆36Updated 4 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- ☆118Updated last year
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆64Updated 3 weeks ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆58Updated 4 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 10 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 11 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated 6 months ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 10 months ago
- Payload for bug bounty☆95Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 5 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆40Updated 3 months ago