amolnaik4 / bodhi
Bodhi - Client-side Vulnerability Playground
☆119Updated 3 years ago
Alternatives and similar repositories for bodhi:
Users that are interested in bodhi are comparing it to the libraries listed below
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Files for appsecwiki.com☆117Updated 4 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Facebook Bug Bounties☆102Updated 4 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Damn Vulnerable eXtensive Training Environment☆105Updated 3 years ago
- Burp Suite extension to discover assets from HTTP response.☆225Updated 3 months ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- Resolve and quickly portscan a list of (sub)domains.☆86Updated 8 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆159Updated 3 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 6 years ago
- Sample vulnerable code and its exploit code☆191Updated 4 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- Notes/Tools for pentesting☆82Updated last year
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- Notes I've taken while working through various web app pentesting labs.☆92Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆113Updated 6 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago