Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testing, or CTF
☆13Oct 23, 2021Updated 4 years ago
Alternatives and similar repositories for Web-App-Methodology
Users that are interested in Web-App-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- ☆27Jan 25, 2020Updated 6 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆96Jun 5, 2021Updated 4 years ago
- My personal bug bounty toolkit.☆164Jun 18, 2024Updated last year
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆66Sep 2, 2022Updated 3 years ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- ☆27Mar 18, 2020Updated 6 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- A list of resources for those interested in getting started in bug bounties☆13Jun 18, 2020Updated 5 years ago
- ☆10Aug 13, 2018Updated 7 years ago
- ☆17May 21, 2022Updated 3 years ago
- A Modern Operating System Written in C++ From Scratch!☆14Jan 30, 2022Updated 4 years ago
- ☆15Apr 4, 2022Updated 3 years ago
- Firebase database finder.☆13Dec 30, 2020Updated 5 years ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- ☆22Oct 30, 2022Updated 3 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Python google hacking (dorking) script.☆18Jul 15, 2018Updated 7 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- Bug Bounty Tools used on Twitch - Recon☆324Sep 6, 2024Updated last year
- Common Bugs from low to critical Level☆16May 9, 2021Updated 4 years ago
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- s3 brute force tool☆44May 7, 2021Updated 4 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A Web-UI for subdomain enumeration (subfinder)☆55Jun 5, 2020Updated 5 years ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- Pentest stuff☆50Nov 30, 2023Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Collection of tools written in vb6 - ProcessKiller, DriveManager, USBManager, LocalRDP, HTTPServer☆20Jul 2, 2017Updated 8 years ago
- Dorks for Google, Shodan and BinaryEdge☆140Mar 3, 2020Updated 6 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago