bryanroma / web-pentesting
Repo oriented to web app testing
☆30Updated last year
Alternatives and similar repositories for web-pentesting:
Users that are interested in web-pentesting are comparing it to the libraries listed below
- Simple fork from degoogle original project with bug hunting purposes☆88Updated 2 years ago
- ☆74Updated 9 months ago
- ☆31Updated 3 years ago
- HTTP verb tampering & methods enumeration☆56Updated 2 years ago
- ☆52Updated last year
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- Enumerate Subdomains Through Google Dorks☆123Updated 3 years ago
- Check List☆77Updated 2 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Useful Github Dorks for BugBounty -☆63Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆53Updated 4 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆40Updated 2 years ago
- ☆48Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- WordPress Bruteforce List, Default paths and endpoints☆65Updated 2 years ago
- ☆62Updated 6 months ago
- ☆83Updated 3 years ago
- A Proof of Concept for Clickjacking Attacks☆54Updated 4 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- ☆21Updated 2 years ago
- ☆27Updated 5 years ago
- ☆141Updated 2 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆103Updated 3 years ago
- My bug bounty notes☆31Updated 3 years ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆44Updated last year
- Summary of almost all paid bounty reports on H1☆40Updated 4 years ago
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- ☆50Updated 3 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆57Updated last week