D3n0Duz / WebPentestChecklistLinks
Workflow for pentesting web applications.
☆21Updated 6 years ago
Alternatives and similar repositories for WebPentestChecklist
Users that are interested in WebPentestChecklist are comparing it to the libraries listed below
Sorting:
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 9 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆14Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆12Updated 3 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A BurpSuite plugin for BBRF☆25Updated 11 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆21Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Just another vulnerable web application.☆36Updated last year
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆38Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆12Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 11 months ago
- Ffuf output browser☆39Updated 2 years ago