Methodoloy for pentesting web applications.
☆10Aug 18, 2022Updated 3 years ago
Alternatives and similar repositories for Application-Pentest-Methodology
Users that are interested in Application-Pentest-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Receives Twitch EventSub Webhooks and Updates the Streams Online Status☆11Mar 2, 2026Updated 3 weeks ago
- ☆31Jan 28, 2020Updated 6 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆24Jun 25, 2023Updated 2 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆20Jul 8, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- A portable linker for multiple file formats.☆14Aug 28, 2023Updated 2 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- It's an AI Agent that analyzes PDFs (provided locally or via the web) using SenecaLLMs fine-tuned for cybersecurity. It identifies sensit…☆18Feb 12, 2025Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis☆17Jun 14, 2024Updated last year
- Simple Summarizer Tool using Llama 3 8b.☆10May 14, 2024Updated last year
- an auto-sleeping and -waking framework around llama.cpp☆12Feb 8, 2025Updated last year
- A list of Awesome Bughunting oneliners , collected from the various sources☆69Aug 14, 2023Updated 2 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- JewRepo Source Link☆40Jun 18, 2023Updated 2 years ago
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆23Feb 8, 2026Updated last month
- My personal repository☆13Jan 18, 2026Updated 2 months ago
- This is just some simple code (very basic) for messing about with eBPF☆12Jan 10, 2026Updated 2 months ago
- Just a Repo of pure ASCII art ;'..;'☆18May 27, 2024Updated last year
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆36Jul 24, 2018Updated 7 years ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- ☆16Nov 27, 2022Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆19Jun 22, 2022Updated 3 years ago
- Other tools developed by CIRT.net☆24Aug 2, 2020Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Pentest stuff☆50Nov 30, 2023Updated 2 years ago
- NZBGet Android Installer☆13Apr 23, 2019Updated 6 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- Midnight Club 2 Remix Projects☆17Oct 6, 2024Updated last year