nahamsec / juice-shopLinks
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆23Updated 6 years ago
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆55Updated 10 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 3 years ago
- bash scripting thing!☆193Updated 2 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆14Updated 3 years ago
- Journey to Try Harder !!!☆31Updated 6 years ago
- Some Templates for Bash Scripting☆17Updated 3 years ago
- Web Application recon automation☆126Updated 5 years ago
- A collection of useful links for Pentesters☆171Updated 7 months ago
- Auto deployment of my VPS☆102Updated 4 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆174Updated 2 years ago
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆132Updated last year
- API Pentesting notes.☆96Updated last year
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆214Updated 5 years ago
- A Python tool to automate some dorking stuff to find information disclosures.☆154Updated last year
- A simple reconnaissance framework for bug bounty hunting☆37Updated 5 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆120Updated last year
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 3 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆94Updated 4 years ago
- Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥☆156Updated 2 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 6 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Updated 9 years ago
- A tool for searching a Git repository for interesting content☆106Updated 2 years ago
- Bug Bounty Dork☆73Updated 3 years ago
- Intelligence gathering framework☆15Updated 10 years ago
- Hunt down the secrets from the WebArchives for Fun and Profit☆163Updated 3 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆31Updated 7 years ago