t3l3machus / toxssinLinks
An XSS exploitation command-line interface and payload generator.
β1,397Updated 9 months ago
Alternatives and similar repositories for toxssin
Users that are interested in toxssin are comparing it to the libraries listed below
Sorting:
- A simple tool for bypassing file upload restrictions.β878Updated last year
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,361Updated 3 months ago
- Real-world infosec wordlists, updated regularlyβ1,579Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Reβ¦β1,724Updated 2 months ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)β1,535Updated 3 years ago
- Nuclei Templates Collectionβ1,037Updated 5 months ago
- Generates millions of keyword-based password mutations in seconds.β1,360Updated 4 months ago
- Automatic SSTI detection tool with interactive interfaceβ1,228Updated 2 months ago
- bypass-url-parserβ1,094Updated this week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search β¦β538Updated last year
- 1337 Wordlists for Bug Bounty Huntingβ851Updated last month
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomainβ¦β882Updated 2 years ago
- A python script to scan for Apache Tomcat server vulnerabilities.β863Updated 3 weeks ago
- β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)β899Updated 5 months ago
- Payload Arsenal for Pentration Tester and Bug Bounty Huntersβ914Updated 2 years ago
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intelβfilter by severity/tags/CVE and scan in one line. ππβ1,119Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.β1,285Updated 5 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.β693Updated 2 years ago
- Rockyou for web fuzzingβ2,928Updated last month
- A repository that includes all the important wordlists used while bug hunting.β1,348Updated 2 years ago
- Sticky notes for pentesting, bug bounty, CTF.β743Updated 2 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,β714Updated last year
- A simple script just made for self use for bypassing 403β1,979Updated last year
- γπγA tool used to hunt down API key leaks in JS files and pagesβ769Updated last month
- The most powerful CRLF injection (HTTP Response Splitting) scanner.β585Updated 2 years ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Dataβ1,334Updated 3 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,080Updated this week
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given targetβ1,411Updated last week
- Fast and customizable subdomain wordlist generator using DSLβ875Updated last month
- Asset inventory of over 800 public bug bounty programs.β1,464Updated 8 months ago