When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
☆25Nov 18, 2025Updated 4 months ago
Alternatives and similar repositories for Pentesting-Methodology
Users that are interested in Pentesting-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆79Apr 3, 2019Updated 7 years ago
- ☆11May 30, 2021Updated 4 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- A Swiss knife for API security testing including a docker image, some labs and resources.☆10Apr 14, 2022Updated 3 years ago
- ☆18Mar 23, 2023Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CTFs I've played so far☆18Feb 1, 2025Updated last year
- ☆15Aug 25, 2021Updated 4 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Burpsuite Extension for Jsmon☆23Updated this week
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- ☆16May 20, 2022Updated 3 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 6 months ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆11Oct 3, 2021Updated 4 years ago
- for intigriti web challenges☆16Apr 11, 2023Updated 3 years ago
- A simple lightdm web greeter for weebs.☆10Jun 14, 2023Updated 2 years ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Updated this week
- ☆21Aug 28, 2022Updated 3 years ago
- Vimana is a modular security framework for auditing Python APIs and Web applications. The plugin-based architecture enables security prof…☆65Jan 14, 2026Updated 2 months ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Payload for bug bounty☆98Jul 7, 2024Updated last year
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆53Dec 16, 2024Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- RootMe Challenges Writeups☆12Jun 1, 2019Updated 6 years ago
- Config files for my GitHub profile.☆12Updated this week
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Solutions to Software Security course provided by University of Maryland - Coursera☆21Dec 19, 2020Updated 5 years ago