ManicodeSecurity / Web-App-PenTesting
Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course
☆8Updated 3 years ago
Alternatives and similar repositories for Web-App-PenTesting:
Users that are interested in Web-App-PenTesting are comparing it to the libraries listed below
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- ☆10Updated 3 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Easy discovery of assets☆13Updated 2 years ago
- ☆19Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Updated 4 years ago
- ☆10Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Noob Penetration tester☆11Updated 10 months ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- A tools for JavaScript Recon☆21Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- ☆15Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆28Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago