Workflow for pentesting web applications.
☆21Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for WebPentestChecklist
Users that are interested in WebPentestChecklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.☆12Jun 24, 2018Updated 7 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- ☆12Jun 24, 2022Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Cloud formation script for solr servers☆17Jul 1, 2015Updated 10 years ago
- List of fresh DNS resolvers updated daily☆107Feb 9, 2023Updated 3 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Mar 17, 2021Updated 5 years ago
- A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.☆19Apr 19, 2020Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beg…☆170Aug 1, 2020Updated 5 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Refactored/cleaned up Elegoo's penguin bot☆11Jan 21, 2019Updated 7 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago
- HTTP request smuggling tools☆18Aug 17, 2020Updated 5 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- ☆10Feb 5, 2024Updated 2 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆60Jun 28, 2020Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- A tool to help calculate and explain bandwidth allowances for Droplets on DigitalOcean.☆16Updated this week