DK9510 / web-app-exploitationLinks
☆17Updated 3 years ago
Alternatives and similar repositories for web-app-exploitation
Users that are interested in web-app-exploitation are comparing it to the libraries listed below
Sorting:
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated 2 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- ☆22Updated 4 years ago
- ☆17Updated 4 years ago
- A curated list of different pentesting resources☆30Updated 3 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- ☆21Updated 3 years ago
- Notes for CRTP☆42Updated 4 years ago
- Sample Obsidian's vault for web pentesting☆99Updated last year
- HTTP parameter discovery suite.☆63Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆44Updated 3 years ago
- ☆72Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆20Updated 3 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆55Updated 4 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- ☆52Updated 8 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Advanced Reconnaissance and Web Application Discovery☆88Updated 3 years ago
- ☆76Updated 4 years ago