☆23Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for Web-Application-Pentest-Checklist
Users that are interested in Web-Application-Pentest-Checklist are comparing it to the libraries listed below
Sorting:
- ☆138Jul 9, 2021Updated 4 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Complite Web Application Penetration Testing☆27Jul 9, 2021Updated 4 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Sep 3, 2022Updated 3 years ago
- ☆109Apr 4, 2025Updated 11 months ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- ☆33Oct 12, 2022Updated 3 years ago
- ☆94Dec 2, 2021Updated 4 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- Enumeration Guide☆45Dec 30, 2019Updated 6 years ago
- ☆47Jan 14, 2024Updated 2 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 6 years ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- Simple recon using multiple tools!☆165Jan 10, 2022Updated 4 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 10 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Learning resources and external resources to help you prepare for your offsec certifications☆102Nov 1, 2024Updated last year
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆518Oct 27, 2025Updated 4 months ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 5 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Dec 4, 2019Updated 6 years ago
- World's most Powerful and Advanced Cross Site Scripting Software☆28Jan 5, 2020Updated 6 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago