OWASP / wstgLinks
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
☆8,558Updated this week
Alternatives and similar repositories for wstg
Users that are interested in wstg are comparing it to the libraries listed below
Sorting:
- Official OWASP Top 10 Document Repository☆4,916Updated last week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,304Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,017Updated last year
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆7,714Updated last year
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,566Updated 7 months ago
- In-depth attack surface mapping and asset discovery☆13,777Updated this week
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,207Updated last year
- 🎯 SQL Injection Payload List☆6,012Updated last year
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,693Updated 2 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,716Updated 3 years ago
- The Bug Hunters Methodology☆4,175Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,447Updated 9 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,415Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,227Updated last month
- A collection of custom security tools for quick needs.☆3,259Updated 2 years ago
- OWASP Web Application Security Testing Checklist☆2,021Updated 3 years ago
- Fast web fuzzer written in Go☆15,095Updated 6 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,496Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,311Updated 9 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,868Updated 4 years ago
- OWASP API Security Project☆2,215Updated 10 months ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆11,987Updated this week
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,348Updated 11 months ago
- 🎯 Command Injection Payload List☆3,630Updated last year
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,222Updated last week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,725Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,309Updated last year
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆6,971Updated 2 months ago
- Open source education content for the researcher community☆2,726Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,524Updated this week