Secure-D / wastcLinks
Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics with short description and recommendation. Its objective is to aid penetration tester to review the web application thoroughly.
☆21Updated 5 years ago
Alternatives and similar repositories for wastc
Users that are interested in wastc are comparing it to the libraries listed below
Sorting:
- WaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS☆138Updated 3 years ago
- Geospatial analysis and simulation using Twitter data☆22Updated 7 years ago
- The domain enumeration and scanning tool for hackers☆18Updated 11 months ago
- A map of who's doing what about Blockchain in Thailand☆13Updated 6 years ago
- Examples demonstrating some common web application vulnerabilities.☆43Updated 9 years ago
- คลังข้อมูลวิธีการเอาตัวรอดด้วยอุปกรณ์ดิจิตอล☆49Updated 3 years ago
- ROP Wargame repository☆26Updated 8 years ago
- ติดตั้ง Kubernetes ในแนวทาง Kubernetes The Hard Way☆196Updated 4 years ago
- ☆13Updated 9 years ago
- Official OWASP Top 10 Document Repository☆10Updated 7 years ago
- An insecure example application (Java)☆33Updated last month
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Updated 4 years ago
- ☆67Updated 11 years ago
- ☆13Updated last month
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Updated 5 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- Message Broadcast System (MBS)☆74Updated 2 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆18Updated 6 years ago
- COVID19 Library☆13Updated 5 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆106Updated 2 years ago
- Cyber Jawara 2020 Final - Jeopardy CTF problemset☆33Updated 3 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- Simple PHP webshell with a JPEG header to bypass weak image verification checks☆65Updated 10 years ago
- Windows Privilege Escalation☆30Updated 5 years ago
- Simple library for thailandpost track EMS☆19Updated 5 years ago