API Pentesting notes.
☆96Nov 4, 2024Updated last year
Alternatives and similar repositories for api-pentesting
Users that are interested in api-pentesting are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- ☆14Feb 15, 2022Updated 4 years ago
- Common Bugs from low to critical Level☆15May 9, 2021Updated 4 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- s3 brute force tool☆44May 7, 2021Updated 4 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 8 months ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- My notes on PentesterLab's Bootcamp series 🕵️☆46Oct 17, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago