joshkar / X-Recon
A utility for detecting webpage inputs and conducting XSS scans.
☆142Updated 10 months ago
Alternatives and similar repositories for X-Recon:
Users that are interested in X-Recon are comparing it to the libraries listed below
- A tool for extract Endpoints, URLs and Secrets from contents☆58Updated 3 weeks ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆82Updated 11 months ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆129Updated 3 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆37Updated 3 weeks ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆14Updated 3 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆105Updated 9 months ago
- ☆158Updated 5 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆94Updated 6 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆171Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- ☆64Updated 7 months ago
- Payload for bug bounty☆93Updated 8 months ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆27Updated 8 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆110Updated 3 months ago
- ☆49Updated 10 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆111Updated this week
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆42Updated 3 months ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆42Updated 3 months ago
- A fast subdomain takeover tool☆75Updated last year
- 🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.☆52Updated last year
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 2 months ago
- This is a useful Python script for generating a target specific wordlist for fuzzing backup files.☆31Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆62Updated 7 months ago
- Automated OSINT on SwaggerHub☆162Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 8 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago