OWASP / OWASPBugBounty
This is a container of web applications that work with OWASP Bug Bounty for Projects
☆32Updated last year
Alternatives and similar repositories for OWASPBugBounty:
Users that are interested in OWASPBugBounty are comparing it to the libraries listed below
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Tools used for Penetration testing / Red Teaming☆65Updated 6 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- ☆35Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 5 months ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Learning Penetration Testing of Android Applications☆77Updated 7 years ago
- ios source grepper☆37Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 5 years ago
- Simple Server Side Request Forgery services enumeration tool.☆54Updated 6 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆47Updated 2 years ago
- scripts for pentesting☆88Updated 6 years ago
- Send notifications if a new program is published on HackerOne using Pushbullet☆26Updated 7 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago