Recon-ng
Last updated
Was this helpful?
Last updated
Was this helpful?
Usage is similar to metasploit: Many of the modules in recon-ng require API keys with their respective service providers. Take some time to check out and its various modules.
This particular module looks for reported xss vulns that have not yet been patched by cisco.