Learn-by-doing / csrf-examples
Example Cross Site Request Forgery (CSRF) vulnerabilities in action.
☆17Updated 8 years ago
Alternatives and similar repositories for csrf-examples:
Users that are interested in csrf-examples are comparing it to the libraries listed below
- ☆9Updated 4 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.Updated last year
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Updated 2 years ago
- ☆40Updated last year
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- Complite Web Application Penetration Testing☆25Updated 3 years ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Updated last year
- ☆9Updated 11 months ago
- Real Cyber Security Interview Questions for Various Job Roles☆54Updated 2 years ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆72Updated 7 months ago
- 🐶 A curated list of Web Security materials and resources.☆10Updated 7 years ago
- ☆13Updated 3 years ago
- Fast Bug Bounty Script☆37Updated 2 months ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆10Updated 2 years ago
- commands☆27Updated 4 years ago
- ☆23Updated last year
- ☆65Updated 6 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Updated 3 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆19Updated 4 years ago
- Penetration Testing Interview Questions☆36Updated 2 years ago
- Tips For Bug Bounty Hunters☆84Updated 2 years ago
- A Django web application for curating Bug Bounty educational Videos☆97Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Updated last year
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆16Updated 2 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated 10 months ago
- CLI Version of SKF Labs☆12Updated last year
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year