A OWASP Based Checklist With 80+ Test Cases
☆197Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for Thick-Client-Pentest-Checklist
Users that are interested in Thick-Client-Pentest-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆19Jun 22, 2022Updated 3 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆19Apr 6, 2024Updated 2 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- A OWASP Based Checklist With 500+ Test Cases☆886Oct 26, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Nov 15, 2023Updated 2 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- ☆20May 18, 2022Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- Generate Claude Code bug bounty skills from public HackerOne reports and GitHub writeups — 18 vuln classes, no private reports needed☆165Mar 12, 2026Updated last month
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆901Jul 22, 2024Updated last year
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated last year
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆180Aug 17, 2023Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Oct 15, 2022Updated 3 years ago
- ☆11Jun 30, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Self-hosted passive subdomain continous monitoring tool.☆172Jan 30, 2024Updated 2 years ago
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- 🚀 Join us for 30days of daily API security tests. #30days30tests We've spent last 120days building amazing API security tests for the c…☆221May 22, 2023Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,471Feb 10, 2024Updated 2 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- ☆18Apr 26, 2021Updated 5 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,512Jan 8, 2026Updated 3 months ago
- Information Security Information From Web☆28Jul 31, 2025Updated 9 months ago
- ☆175Nov 20, 2025Updated 5 months ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 5 years ago