Collection of Some Good research Documentation
☆27Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for WriteUp
Users that are interested in WriteUp are comparing it to the libraries listed below
Sorting:
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- A fuzzer made in golang for finding issues like xss, lfi, rce, ssti...that detects issues using change in content length and verify it us…☆62Oct 25, 2020Updated 5 years ago
- This repo includes my analysis of some public reports.☆55Sep 22, 2020Updated 5 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- A tool to test working urls.☆43Nov 17, 2020Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Android Hacking Event 2017 Write-up☆44Jun 27, 2017Updated 8 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Common Wordlists☆55Aug 26, 2016Updated 9 years ago
- ☆34Feb 15, 2021Updated 5 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Day by day Lots of Newbie Come into bug Bounty They ask Social Site about Bug Bounty Site, So That's why I open My Hunted All Site.☆32Sep 20, 2020Updated 5 years ago
- ☆54Jan 22, 2025Updated last year
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 10 months ago