joshkar / X-Recon
A utility for detecting webpage inputs and conducting XSS scans.
☆138Updated 8 months ago
Alternatives and similar repositories for X-Recon:
Users that are interested in X-Recon are comparing it to the libraries listed below
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆79Updated 8 months ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆120Updated 2 weeks ago
- A tool for extract Endpoints, URLs and Secrets from contents☆53Updated 8 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆31Updated last month
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆92Updated 4 months ago
- Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths …☆89Updated 3 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆42Updated this week
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆98Updated 6 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 8 months ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆40Updated 2 weeks ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆155Updated 3 weeks ago
- 🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.☆50Updated last year
- ☆64Updated 5 months ago
- Payload for bug bounty☆93Updated 6 months ago
- Automated OSINT on SwaggerHub☆151Updated last year
- an exploit of Server-side request forgery (SSRF)☆48Updated 5 months ago
- A fast subdomain takeover tool☆72Updated last year
- This is a useful Python script for generating a target specific wordlist for fuzzing backup files.☆31Updated last year
- ☆154Updated 2 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆38Updated 2 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 6 months ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆27Updated 5 months ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆74Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆141Updated 5 months ago
- ☆47Updated 7 months ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆114Updated last month
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆78Updated 4 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆42Updated 10 months ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆26Updated last month