Workflow for pentesting web applications.
☆21Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for WebPentestChecklist
Users that are interested in WebPentestChecklist are comparing it to the libraries listed below
Sorting:
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.☆12Jun 24, 2018Updated 7 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- ☆21Mar 16, 2021Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Hacking with the power of checklists.☆39Dec 18, 2018Updated 7 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.☆19Apr 19, 2020Updated 5 years ago
- ☆72Sep 18, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Mar 17, 2021Updated 4 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- HTTP request smuggling tools☆18Aug 17, 2020Updated 5 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- ☆26Jul 12, 2023Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆61Jun 28, 2020Updated 5 years ago
- ☆66Aug 25, 2021Updated 4 years ago