phra / crosser
A Reflected / Stored / DOM XSS Scanner based on Headless Chrome Node API via Puppeteer
☆39Updated 2 years ago
Alternatives and similar repositories for crosser:
Users that are interested in crosser are comparing it to the libraries listed below
- Maintaining account persistence via XSS and Oauth☆78Updated 6 years ago
- ☆28Updated 4 years ago
- Broken Link Hijacking Burp Extension☆56Updated 5 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆52Updated 3 years ago
- A Go implementation of dirsearch.☆43Updated 5 years ago
- ☆22Updated 2 years ago
- Burp Suite extension to help make Graphql request more readable☆30Updated 7 years ago
- Scan secrets from Continuous Integration Build Logs☆52Updated 5 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆62Updated 3 years ago
- A Burp extension to show the Collaborator client in a tab☆36Updated 2 years ago
- ☆36Updated 4 years ago
- Auto Recon Bash Script☆30Updated 3 weeks ago
- ☆41Updated 4 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆45Updated 4 years ago
- Extract relative urls from a heap snapshot☆85Updated 3 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- ☆69Updated 3 years ago
- RAS(RAndom Subdomain) Fuzzer☆43Updated 5 years ago
- Authenticated SSRF in Grafana☆79Updated 7 months ago
- ☆51Updated 8 months ago
- JWT fuzzer☆104Updated 6 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Updated 10 months ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- ☆23Updated 11 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that improve an active and passive scanner by yourself. This …☆60Updated 3 years ago
- Find orphaned IP's on cloud services☆29Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- ☆36Updated 6 years ago