A list of web application security
☆15Dec 26, 2019Updated 6 years ago
Alternatives and similar repositories for awesome-web-hacking
Users that are interested in awesome-web-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆44Mar 24, 2025Updated last year
- Learn AWS Security by Example☆22Apr 20, 2022Updated 3 years ago
- Learning resources for cybersecurity including youtube, github, books, videos, courses, labs, articles etc. at one place☆76Dec 28, 2024Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Quick and dirty script to check for No RL☆31Feb 18, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cipher Suite Checker☆12Mar 22, 2023Updated 3 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 1, 2026Updated last month
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆389Oct 25, 2025Updated 5 months ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- ☆12Apr 14, 2021Updated 5 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆448Dec 28, 2024Updated last year
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 8 months ago
- A comprehensive VS Code snippet collection for Jinja2 and Django template engines.☆14Updated this week
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- Prompts, resources, demos, and everything☆23Dec 10, 2022Updated 3 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generatrum Linguarum, a conlang word generator library☆11Mar 28, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jan 12, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆20Feb 29, 2024Updated 2 years ago
- Python for Security is the home of all open source Python projects that can integrate with Microsoft Technologies.☆12Jan 10, 2022Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆19Oct 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Source files for the website☆17Updated this week
- A linguistic gloss formatter for several mark-up languages.☆12Updated this week
- A curated list of various bug bounty tools☆19Nov 7, 2021Updated 4 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 7 years ago