geeksonsecurity / vuln-web-appsLinks
A curated list of vulnerable web applications.
☆301Updated last year
Alternatives and similar repositories for vuln-web-apps
Users that are interested in vuln-web-apps are comparing it to the libraries listed below
Sorting:
- A collection of templates for bug bounty reporting☆403Updated last month
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆442Updated 4 years ago
- Damn Vulnerable WordPress☆185Updated last year
- RepoToStoreBugBountyInfo☆321Updated 5 years ago
- this html file creates a csrf poc form to any http request.☆277Updated 2 years ago
- ☆592Updated last year
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆539Updated 2 years ago
- Web App bug hunting☆566Updated 2 months ago
- this repo contains required files for web application pentests☆187Updated 8 years ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆455Updated 6 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆463Updated 2 years ago
- ☆427Updated 2 years ago
- Fast and easy script to manage pentesting training apps☆350Updated last year
- 🎯 Open Redirect Payload List☆595Updated 10 months ago
- 🎯 RFI/LFI Payload List☆595Updated 10 months ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆313Updated 10 months ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆245Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated 2 months ago
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆533Updated 6 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆362Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- Automating XSS using Bash☆355Updated last year
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆336Updated last year
- ☆333Updated 5 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆412Updated 4 years ago
- Tips for Penetration Testing☆118Updated last year
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆727Updated last year
- Simple shell script for automated domain recognition with some tools☆299Updated 4 years ago