raesene / OWASP_Web_App_Testing_Cheatsheet_ConverterLinks
OWASP Web Application Testing Cheat Sheet converted to tool formats
☆25Updated 9 years ago
Alternatives and similar repositories for OWASP_Web_App_Testing_Cheatsheet_Converter
Users that are interested in OWASP_Web_App_Testing_Cheatsheet_Converter are comparing it to the libraries listed below
Sorting:
- A More or less Random Collection of Scripts for security Testing.☆64Updated 3 years ago
- Code repository for Mastering Modern Web Penetration Testing, published by Packt☆72Updated 3 years ago
- Information Gathering Tool☆24Updated 12 years ago
- Amazon S3 bucket spelunking!☆87Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 9 years ago
- BurpJDSer-ng☆29Updated this week
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Common Findings Database☆101Updated 6 years ago
- scripts for pentesting☆86Updated 7 years ago
- OAuth Security Cheatsheet☆41Updated 11 years ago
- ☆75Updated 11 years ago
- OAuth plugin for Burp Suite Extender☆43Updated 7 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- PwnWiki - The notes section of the pentesters mind.☆27Updated 11 years ago
- ☆12Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 11 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago