DK9510 / web-app-exploitationLinks
☆18Updated 3 years ago
Alternatives and similar repositories for web-app-exploitation
Users that are interested in web-app-exploitation are comparing it to the libraries listed below
Sorting:
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- Template used for my OSCP exam.☆30Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- ☆72Updated 5 years ago
- ☆55Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆22Updated 4 years ago
- Attack Surface Discovery Tool☆110Updated last year
- A curated list of different pentesting resources☆29Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- ☆17Updated 4 years ago
- Sample Obsidian's vault for web pentesting☆100Updated last year
- Wordlist for Hacking, Penetration Testing, Vulnerability Assessments and More☆63Updated last year
- Advanced Reconnaissance and Web Application Discovery☆89Updated 3 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- ☆51Updated 8 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆171Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆124Updated 3 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 3 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆19Updated 6 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆105Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆72Updated last year
- HTTP parameter discovery suite.☆63Updated 5 years ago