A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
☆105Feb 12, 2025Updated last year
Alternatives and similar repositories for Offensive-Pentesting-Web
Users that are interested in Offensive-Pentesting-Web are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆101Oct 13, 2025Updated 6 months ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆99Sep 27, 2025Updated 7 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 8 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆438Mar 16, 2026Updated last month
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆37Jan 6, 2025Updated last year
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆66Aug 19, 2025Updated 8 months ago
- OWASP Foundation Web Respository☆28Apr 8, 2026Updated 3 weeks ago
- Web Application Penetration Testing☆154May 4, 2025Updated last year
- ☆30Aug 22, 2019Updated 6 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- ☆103Aug 31, 2021Updated 4 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- SSL/TLS Certificate Checker - A Python script to validate SSL/TLS certificates for common misconfigurations and output the results in JSO…☆18Sep 27, 2023Updated 2 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 4 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆31May 30, 2024Updated last year
- Burp suite extension which help you to find inconsistency between content-type header and body parsers☆11Sep 14, 2025Updated 7 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆40Apr 19, 2024Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Oct 13, 2020Updated 5 years ago
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Mar 26, 2026Updated last month
- Hack instagram using simple bruteforce method ✨☆12Aug 13, 2024Updated last year
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Oct 16, 2024Updated last year
- A research project to crawl and analyze Top 1 million domains☆25Feb 7, 2023Updated 3 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- ☆15Oct 14, 2019Updated 6 years ago
- Application Security Mind Maps☆12Apr 10, 2021Updated 5 years ago
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago