NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security researchers and penetration testers discover and validate blind XSS vulnerabilities by capturing detailed information when payloads execute on target systems.
☆30Jan 14, 2026Updated 3 months ago
Alternatives and similar repositories for nexss
Users that are interested in nexss are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆83Sep 5, 2025Updated 7 months ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆39May 5, 2025Updated 11 months ago
- Sharing Knowledge "Hands On Scraping Data dengan kasus Analisis Sentimen pada Kebijakan Pemerintah"☆23May 28, 2025Updated 10 months ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Web Desktop App Using Integrated Extjs 4.2 and Node.js☆14Apr 6, 2016Updated 10 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆13Oct 23, 2016Updated 9 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 7 months ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated 3 weeks ago
- Code Source Ujian Online☆20Jul 14, 2015Updated 10 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of templates from various resources☆44Dec 5, 2025Updated 4 months ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆56Jun 12, 2025Updated 10 months ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Maintained list of Stretchoid scanner IPs☆11Apr 6, 2026Updated last week
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆32Sep 4, 2025Updated 7 months ago
- Collections Config sing-box, clash, clash.meta, Rules Firewall, Whitelist DNS, Blocklist Domains.☆27Updated this week
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.☆26Jul 27, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository of CTF challenges for The Cyber Jawara International 2024☆19Oct 28, 2024Updated last year
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- 🎭 Reveal the identity behind a share link☆83Apr 6, 2026Updated last week
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- A CKAN extension to hold various security improvements for CKAN☆26Feb 18, 2026Updated last month
- Collection of red team techniques.☆70Apr 25, 2025Updated 11 months ago
- Reset IDE data, Create backup and restore, manage multi-account easily, Work for VS-Code/fork based app.☆31Feb 11, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆25Mar 3, 2022Updated 4 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- A simple meme making php script developed implementing the PHP GD Library.☆17Apr 16, 2025Updated last year
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆97Dec 27, 2025Updated 3 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago