Erdemstar / VulnerableApp4APISecurity
This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.
☆48Updated 10 months ago
Related projects: ⓘ
- ☆63Updated 2 months ago
- Chista | Open Threat Intelligence Framework☆51Updated 4 months ago
- ☆12Updated last year
- #cheat sheet for OSWP☆75Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆32Updated 4 months ago
- ☆84Updated last year
- ☆12Updated 2 years ago
- ☆132Updated 3 years ago
- This is a repository for network security tools and technologies.☆94Updated last year
- Useful resources about phishing email analysis☆76Updated 2 years ago
- Reports of cyber threat intelligence☆14Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆92Updated last year
- eLearnSecurity Certified Exploit Development☆98Updated 3 years ago
- List of questions, answers and random notes for security interviews☆69Updated 3 years ago
- ☆72Updated 3 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆84Updated 5 months ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- Script to manage and create local pentesting training virtual lab☆47Updated 4 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆28Updated this week
- Hi everyone,☆57Updated last year
- OSCP Cheatsheet by Sai Sathvik☆68Updated 11 months ago
- A OWASP Based Checklist With 80+ Test Cases☆127Updated last year
- This Repo will help you to prepare better for CEH - Practical Exam☆48Updated 6 months ago
- Web Application Penetration Testing☆86Updated last month
- ☆10Updated this week
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker☆25Updated 3 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆51Updated 2 years ago
- Tips for Penetration Testing☆98Updated last year
- ☆34Updated last year
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆95Updated 2 years ago