gotr00t0day / Web-Application-Penetration-Testing-MethodologyView external linksLinks
Web Application Penetration Testing Methodology
☆44Nov 12, 2025Updated 3 months ago
Alternatives and similar repositories for Web-Application-Penetration-Testing-Methodology
Users that are interested in Web-Application-Penetration-Testing-Methodology are comparing it to the libraries listed below
Sorting:
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 7 months ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆66Jun 4, 2025Updated 8 months ago
- Argument injection vulnerability in PHP☆12Jun 15, 2024Updated last year
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆27Jan 22, 2026Updated 3 weeks ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆18Mar 26, 2025Updated 10 months ago
- Space theme for KDE☆14Dec 18, 2024Updated last year
- Automated GitHub secret scanning with smart alerting & monitoring.☆29Jan 15, 2026Updated 3 weeks ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆37Sep 23, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- ☆17Apr 26, 2025Updated 9 months ago
- ☆16May 17, 2024Updated last year
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆16Aug 20, 2025Updated 5 months ago
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- A list of Mind-Map for those interested in getting started in bug bounties.☆17Jul 9, 2021Updated 4 years ago
- ☆31Mar 28, 2025Updated 10 months ago
- ☆109Feb 20, 2025Updated 11 months ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- ☆23Jan 5, 2026Updated last month
- Webanator: Webcam scraper written in python that will scrape any countries web cameras.☆21Jan 10, 2026Updated last month
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated last year
- ☆23Sep 19, 2024Updated last year
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆26Dec 24, 2024Updated last year
- An elegant and flavored dark theme for vs code☆23Nov 8, 2018Updated 7 years ago
- Purpose-built Red Team network hardware implant made from common components.☆25Mar 18, 2023Updated 2 years ago
- This repository is made to create your own pentesting reports based on the following templates.☆26Feb 5, 2025Updated last year
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆43Dec 19, 2025Updated last month
- Want to become an Application Security Engineer? Here's a roadmap to help you get there.☆32Sep 3, 2022Updated 3 years ago
- Welcome to DarkWebEye Explore the unseen depths of the internet with DarkWebEye, a powerful and intuitive tool crafted by Jolanda de Koff…☆50Jan 31, 2026Updated last week
- AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SS…☆55Dec 27, 2025Updated last month
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 2 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆36Updated this week
- PCEP™ – Certified Entry-Level Python Programmer certification shows that the individual is familiar with universal computer programming c…☆35Jan 22, 2023Updated 3 years ago
- ☆168Sep 20, 2024Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆49May 1, 2025Updated 9 months ago
- ☆163Feb 11, 2025Updated last year
- BTSM (Behind-the-Scenes Manipulation) Payloads PoC☆31Mar 9, 2024Updated last year