This repository contains list of web security related resources that you can use to gain new skills and extend knowledge
☆70May 26, 2025Updated 9 months ago
Alternatives and similar repositories for web-security-learning-resources
Users that are interested in web-security-learning-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- ☆19Mar 13, 2022Updated 4 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- This repo about how to start in Pen-Testing Fields☆31Aug 8, 2022Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Useful tips and resources for preparing for the AWAE exam.☆178Jul 30, 2021Updated 4 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- 一个用于检测HOST 头攻击漏洞的Burp Suite扩展插件。☆13Mar 7, 2025Updated last year
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- Summary of almost all paid bounty reports on H1☆47Sep 8, 2020Updated 5 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- ☆385Jun 30, 2021Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆44Mar 23, 2022Updated 4 years ago
- A collection of awesome resources for understanding web caching.☆10Oct 14, 2017Updated 8 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- ☆13Feb 4, 2024Updated 2 years ago
- ☆13Sep 28, 2024Updated last year
- ☆13Jun 11, 2014Updated 11 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- ☆158Sep 20, 2021Updated 4 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- ☆15Mar 27, 2019Updated 6 years ago