A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
☆101Feb 12, 2025Updated last year
Alternatives and similar repositories for Offensive-Pentesting-Web
Users that are interested in Offensive-Pentesting-Web are comparing it to the libraries listed below
Sorting:
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆98Sep 27, 2025Updated 5 months ago
- ☆13Oct 16, 2025Updated 4 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 6 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆427Sep 20, 2024Updated last year
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆36Jan 6, 2025Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆26Jan 27, 2026Updated last month
- ☆10Jan 30, 2022Updated 4 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- Web Application Penetration Testing☆146May 4, 2025Updated 9 months ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Oct 31, 2018Updated 7 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- A research project to crawl and analyze Top 1 million domains☆22Feb 7, 2023Updated 3 years ago
- Pentesting report template for the masses☆16Apr 2, 2020Updated 5 years ago
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- ☆20May 18, 2022Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆28Feb 6, 2024Updated 2 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆30May 30, 2024Updated last year
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- ☆31Jan 28, 2020Updated 6 years ago