Secure-D / wastcLinks
Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics with short description and recommendation. Its objective is to aid penetration tester to review the web application thoroughly.
☆21Updated 5 years ago
Alternatives and similar repositories for wastc
Users that are interested in wastc are comparing it to the libraries listed below
Sorting:
- WaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS☆139Updated 4 years ago
- ROP Wargame repository☆27Updated 8 years ago
- The domain enumeration and scanning tool for hackers☆18Updated last year
- Geospatial analysis and simulation using Twitter data☆22Updated 7 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Updated 6 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆75Updated 7 years ago
- A map of who's doing what about Blockchain in Thailand☆13Updated 7 years ago
- COVID19 Library☆13Updated 5 years ago
- My writeups of various CTFs & security challenges☆73Updated 3 months ago
- A cheat sheet for attacking SQLite via SQLi☆102Updated 9 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Updated 8 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Updated 4 years ago
- Vulnerable webapp testbed☆24Updated 9 years ago
- ☆17Updated 5 months ago
- HTTP Desync Attack☆28Updated 5 years ago
- ☆20Updated 8 years ago
- คลังข้อมูลวิธีการเอาตัวรอดด้วยอุปกรณ์ดิจิตอล☆49Updated 4 years ago
- ติดตั้ง Kubernetes ในแนวทาง Kubernetes The Hard Way☆196Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- learning case to prepare OSWE☆37Updated 6 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Updated 8 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 4 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Updated 6 years ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- Damn Vulnerable Thick Client App☆154Updated 5 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 7 months ago
- CTF Writeups☆26Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- An android application which exploits sieve through android components.☆44Updated 8 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆132Updated 5 years ago