gosirys / WebSecurity-ITA-2009View external linksLinks
A training course on Web Security, Exploit Development and Source Code Auditing from 2009.
☆12Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for WebSecurity-ITA-2009
Users that are interested in WebSecurity-ITA-2009 are comparing it to the libraries listed below
Sorting:
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Some of the gf patterns which i use☆45Jan 19, 2022Updated 4 years ago
- ☆13Jul 13, 2023Updated 2 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 3 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆56Jan 10, 2022Updated 4 years ago
- tools to find xss in a website☆62Apr 27, 2022Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- ☆12Jun 15, 2022Updated 3 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- Nuclei templates for drupal vulns... far from perfect☆18Jan 9, 2025Updated last year
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 2 months ago
- A tool to extract all the urls and paths found in the content of a page (js sources included)☆22Aug 8, 2025Updated 6 months ago
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆22Feb 8, 2026Updated last week
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- ☆22Dec 1, 2025Updated 2 months ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- Real Cyber Security Interview Questions for Various Job Roles☆59May 21, 2022Updated 3 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- ☆23Mar 3, 2020Updated 5 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆29Nov 2, 2022Updated 3 years ago