NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security researchers and penetration testers discover and validate blind XSS vulnerabilities by capturing detailed information when payloads execute on target systems.
☆31Jan 14, 2026Updated 3 months ago
Alternatives and similar repositories for nexss
Users that are interested in nexss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆83Sep 5, 2025Updated 8 months ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆39May 5, 2025Updated last year
- Sharing Knowledge "Hands On Scraping Data dengan kasus Analisis Sentimen pada Kebijakan Pemerintah"☆23May 28, 2025Updated 11 months ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Web Desktop App Using Integrated Extjs 4.2 and Node.js☆14Apr 6, 2016Updated 10 years ago
- Postman collection to work with Sophos Central APIs☆26Jan 8, 2026Updated 4 months ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆13Oct 23, 2016Updated 9 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated last month
- Code Source Ujian Online☆20Jul 14, 2015Updated 10 years ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆16Sep 6, 2024Updated last year
- Collection of templates from various resources☆45Apr 30, 2026Updated last week
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆56Jun 12, 2025Updated 10 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- Maintained list of Stretchoid scanner IPs☆11Apr 6, 2026Updated last month
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆32Sep 4, 2025Updated 8 months ago
- [b2/cafelog] Historical repository of b2/cafelog which was forked to WordPress☆16Nov 5, 2015Updated 10 years ago
- Collections Config sing-box, clash, clash.meta, Rules Firewall, Whitelist DNS, Blocklist Domains.☆28Apr 26, 2026Updated last week
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.☆29Jul 27, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Collection of red team techniques.☆70Apr 25, 2025Updated last year
- Reset IDE data, Create backup and restore, manage multi-account easily, Work for VS-Code/fork based app.☆33Feb 11, 2026Updated 2 months ago
- ☆27Mar 3, 2022Updated 4 years ago
- ☆96May 15, 2020Updated 5 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A proof of concept project to detect an stop Evil Twin Attacks.☆16Oct 3, 2019Updated 6 years ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆101Dec 27, 2025Updated 4 months ago
- A simple meme making php script developed implementing the PHP GD Library.☆17Apr 16, 2025Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆99Sep 27, 2025Updated 7 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago