h4cks1lv3r / OWASP-Testing-GuideLinks
A checklist for systematically going through the OWASP Testing Guide V4
☆16Updated 4 months ago
Alternatives and similar repositories for OWASP-Testing-Guide
Users that are interested in OWASP-Testing-Guide are comparing it to the libraries listed below
Sorting:
- ☆44Updated 3 months ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆27Updated 10 months ago
- A passive way to find backups/ sensitive information.☆80Updated 2 weeks ago
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆71Updated 4 months ago
- Grep subdomains from web pages.☆42Updated 3 months ago
- Url scrapper or extractor from alienvault☆33Updated 3 months ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Updated last year
- ☆35Updated 6 months ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆81Updated 4 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆30Updated 2 months ago
- ☆27Updated last year
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆44Updated 2 months ago
- ☆57Updated 9 months ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆26Updated 6 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated 7 months ago
- A Powerful Recon Engine☆63Updated 6 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 4 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 7 months ago
- Collection of templates from various resources☆36Updated last month
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 8 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆32Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆35Updated 3 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆43Updated 5 months ago
- ☆46Updated 2 months ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Updated last year
- Tools for bug bounty☆27Updated last year
- CVE-2025-24016: RCE in Wazuh server! Remote Code Execution☆38Updated 3 months ago
- Custom nuclei templates for bug hunting.....☆26Updated last year
- AI/LLM local model integration for analysis of reconftw results☆58Updated last month
- ☆31Updated last month