geeksonsecurity / vuln-web-apps
A curated list of vulnerable web applications.
☆295Updated last year
Alternatives and similar repositories for vuln-web-apps:
Users that are interested in vuln-web-apps are comparing it to the libraries listed below
- A collection of templates for bug bounty reporting☆396Updated 3 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆245Updated 3 years ago
- this html file creates a csrf poc form to any http request.☆272Updated 2 years ago
- Damn Vulnerable WordPress☆181Updated last year
- A simple web app with a XXE vulnerability.☆227Updated 3 years ago
- ☆329Updated 5 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆532Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆442Updated 4 years ago
- OSWE Preparation☆613Updated 2 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆361Updated last year
- 🎯 Open Redirect Payload List☆576Updated 9 months ago
- 🎯 RFI/LFI Payload List☆580Updated 9 months ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆319Updated 3 weeks ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆452Updated 5 years ago
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago
- ☆582Updated last year
- Web recon script. No need to fear, sumrecon is here!☆375Updated 2 years ago
- Awesome Writeups and POCs☆529Updated 2 months ago
- Materials for OSCP exam☆378Updated last year
- RepoToStoreBugBountyInfo☆304Updated 5 years ago
- Web App bug hunting☆563Updated last month
- Some good resources for getting started with application security☆142Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆440Updated 2 years ago
- ☆232Updated 3 years ago
- All Things Bug Bounty☆114Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆716Updated last year
- Find AWS S3 buckets and test their permissions.☆384Updated 2 years ago
- Combination of all my Resources, Links & Scripts☆261Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated 2 years ago
- ☆425Updated 2 years ago