When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
☆25Nov 18, 2025Updated 4 months ago
Alternatives and similar repositories for Pentesting-Methodology
Users that are interested in Pentesting-Methodology are comparing it to the libraries listed below
Sorting:
- ☆79Apr 3, 2019Updated 6 years ago
- ☆11May 30, 2021Updated 4 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- ☆18Mar 23, 2023Updated 3 years ago
- ☆11Jan 9, 2019Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Common google dorks and others you prolly donn know :P☆38Jul 28, 2014Updated 11 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- ☆15Aug 25, 2021Updated 4 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Burpsuite Extension for Jsmon☆23Feb 5, 2026Updated last month
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- ☆18Jul 10, 2024Updated last year
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆11Oct 3, 2021Updated 4 years ago
- ☆14Nov 12, 2024Updated last year
- for intigriti web challenges☆16Apr 11, 2023Updated 2 years ago
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Oct 5, 2024Updated last year
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- CTF Writeups☆14Aug 20, 2023Updated 2 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Mar 9, 2026Updated 2 weeks ago
- ☆21Aug 28, 2022Updated 3 years ago
- Vimana is a modular security framework for auditing Python APIs and Web applications. The plugin-based architecture enables security prof…☆65Jan 14, 2026Updated 2 months ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- Payload for bug bounty☆98Jul 7, 2024Updated last year
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- RootMe Challenges Writeups☆12Jun 1, 2019Updated 6 years ago