geeksonsecurity / vuln-web-apps
A curated list of vulnerable web applications.
☆299Updated last year
Alternatives and similar repositories for vuln-web-apps
Users that are interested in vuln-web-apps are comparing it to the libraries listed below
Sorting:
- A collection of templates for bug bounty reporting☆399Updated 2 weeks ago
- this html file creates a csrf poc form to any http request.☆274Updated 2 years ago
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆453Updated 6 years ago
- A simple web app with a XXE vulnerability.☆227Updated 3 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆240Updated 5 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆245Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆441Updated 4 years ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- Damn Vulnerable WordPress☆181Updated last year
- Tips for Penetration Testing☆114Updated last year
- Fast and easy script to manage pentesting training apps☆345Updated last year
- ☆232Updated 3 years ago
- OSWE Preparation☆615Updated 2 years ago
- 🎯 RFI/LFI Payload List☆585Updated 9 months ago
- ☆587Updated last year
- ☆425Updated 2 years ago
- 🎯 Open Redirect Payload List☆586Updated 9 months ago
- RepoToStoreBugBountyInfo☆308Updated 5 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆720Updated last year
- OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber☆374Updated 10 months ago
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- Tools and datas related to Bug Bounty.☆234Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆444Updated 2 years ago
- All Things Bug Bounty☆115Updated 2 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆361Updated last year
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated last month
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆535Updated 2 years ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily rep…☆252Updated last year
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆411Updated 4 years ago