geeksonsecurity / vuln-web-appsLinks
A curated list of vulnerable web applications.
ā323Updated last year
Alternatives and similar repositories for vuln-web-apps
Users that are interested in vuln-web-apps are comparing it to the libraries listed below
Sorting:
- A collection of templates for bug bounty reportingā424Updated 6 months ago
- šÆ Open Redirect Payload Listā619Updated last year
- this html file creates a csrf poc form to any http request.ā280Updated 2 years ago
- Awesome Writeups and POCsā552Updated 8 months ago
- Damn Vulnerable WordPressā190Updated last year
- Tips for Penetration Testingā130Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.ā324Updated last year
- Some good resources for getting started with application securityā143Updated 4 years ago
- Fast and easy script to manage pentesting training appsā370Updated last year
- Web App bug huntingā573Updated 7 months ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbountyā248Updated 4 months ago
- ā612Updated last year
- A simple web app with a XXE vulnerability.ā229Updated 3 years ago
- Combination of all my Resources, Links & Scriptsā281Updated 6 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.ā552Updated 2 years ago
- šÆ RFI/LFI Payload Listā622Updated last year
- ā434Updated 2 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.ā469Updated 2 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.ā321Updated last year
- OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyberā394Updated last year
- Poor (rich?) man's bug bounty pipeline https://dubell.ioā276Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.ā454Updated 5 years ago
- šÆ CSV Injection Payloadsā230Updated last year
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types iā¦ā152Updated 7 years ago
- RepoToStoreBugBountyInfoā348Updated 5 years ago
- BugBountyTipsā414Updated 2 months ago
- Repo for all the SKF Docker lab examplesā458Updated last year
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.ā464Updated 3 years ago
- All Things Bug Bountyā116Updated 3 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests aā¦ā343Updated 4 years ago