☆25Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for WebHacking-Compiled
Users that are interested in WebHacking-Compiled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated 2 weeks ago
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆32Jul 13, 2023Updated 2 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- This Tool To Test Machine Keys In View State☆85Oct 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tools for bug bounty☆29Jul 9, 2025Updated 9 months ago
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 4 years ago
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated last month
- ☆47Jan 14, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- ☆16Mar 29, 2024Updated 2 years ago
- my nuclei templates☆41Apr 21, 2024Updated last year
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆99Feb 22, 2026Updated last month
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆26Dec 7, 2023Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Dec 7, 2025Updated 4 months ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆139Nov 9, 2024Updated last year
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last month
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- A subdomain fuzzing tool☆172Jun 1, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆36Apr 25, 2025Updated 11 months ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 7 months ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆30Nov 7, 2023Updated 2 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Mar 23, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python for AWAE (Advanced Web Attacks and Exploitation)☆104Sep 5, 2023Updated 2 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year