☆25Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for WebHacking-Compiled
Users that are interested in WebHacking-Compiled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated last month
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆32Jul 13, 2023Updated 2 years ago
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- This Tool To Test Machine Keys In View State☆86Oct 11, 2024Updated last year
- Tools for bug bounty☆29Jul 9, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 4 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 4 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 10 months ago
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆47Jan 14, 2024Updated 2 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆20Jun 30, 2020Updated 5 years ago
- ☆16Mar 29, 2024Updated 2 years ago
- my nuclei templates☆41Apr 21, 2024Updated 2 years ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆102Feb 22, 2026Updated 2 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆26Dec 7, 2023Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 4 months ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆140Nov 9, 2024Updated last year
- Passively check for XSS character encodings☆19Mar 9, 2026Updated last month
- A subdomain fuzzing tool☆172Jun 1, 2024Updated last year
- A small script to import and ban IPs from a list (like from blocklist.de)☆13Oct 23, 2016Updated 9 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆30Nov 7, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 7 months ago
- OWASP Foundation web repository☆18Oct 11, 2025Updated 6 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆37Apr 25, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Apr 22, 2026Updated last week
- Python for AWAE (Advanced Web Attacks and Exploitation)☆104Sep 5, 2023Updated 2 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago