nahamsec / juice-shopLinks
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆22Updated 5 years ago
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆53Updated 9 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆12Updated 3 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- use at your own risk☆37Updated 5 years ago
- Wwwordlist is a wordlist generator for pentesters and bug bounty hunters. It extracts words from HTML, URLs, JS/HTTP/input variables, quo…☆104Updated last year
- ☆36Updated 5 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- Notes from OSCP, CTF, security adventures, etc...☆60Updated last year
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆21Updated 5 years ago
- Some Templates for Bash Scripting☆16Updated 2 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆40Updated 7 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆24Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆31Updated 6 years ago
- Bug Bounty Dork☆71Updated 3 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 3 years ago
- Recon_profile☆37Updated 5 years ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- The tools I have programmed to help me with bugbounty's☆115Updated 5 years ago
- Bash script to automate Bug Bounty Reconnaissance☆38Updated 4 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- ☆76Updated last year
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆43Updated 11 months ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 2 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆176Updated last year
- ☆58Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 2 years ago
- A curated list of amazingly awesome OSINT☆19Updated 5 years ago