Methodoloy for pentesting web applications.
☆10Aug 18, 2022Updated 3 years ago
Alternatives and similar repositories for Application-Pentest-Methodology
Users that are interested in Application-Pentest-Methodology are comparing it to the libraries listed below
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Receives Twitch EventSub Webhooks and Updates the Streams Online Status☆11Feb 18, 2026Updated 2 weeks ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- ☆31Jan 28, 2020Updated 6 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Source code for Hacker101.com - a free online web and mobile security class.☆15Apr 28, 2022Updated 3 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆20Jul 8, 2024Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- My personal repository☆13Jan 18, 2026Updated last month
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆23Jun 25, 2023Updated 2 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆37Jul 24, 2018Updated 7 years ago
- A directory of cheat sheets to use with TLDR, cheat.sh, or Navi☆21Jan 14, 2025Updated last year
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- ☆10Aug 20, 2020Updated 5 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Sep 6, 2024Updated last year
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆69Aug 14, 2023Updated 2 years ago
- Xssor.go is a xss reflections checker for urls☆71Mar 22, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 2 months ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago