refabr1k / owasp-juiceshop-solutionsLinks
OWASP juice shop solutions
☆40Updated 3 years ago
Alternatives and similar repositories for owasp-juiceshop-solutions
Users that are interested in owasp-juiceshop-solutions are comparing it to the libraries listed below
Sorting:
- Official writeups for Hack The Boo CTF 2024☆54Updated last year
- A comprehensive, step-by-step penetration testing checklist for ethical hackers. Covers pre-engagement, information gathering, analysis, …☆111Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆87Updated 7 months ago
- Pentest Report Generator☆440Updated 2 months ago
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆156Updated 3 weeks ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆207Updated 8 months ago
- Autofill Phishing☆85Updated 4 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆96Updated 2 years ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆79Updated 2 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆72Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆115Updated 2 years ago
- Templates for submissions☆89Updated 5 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆89Updated 2 months ago
- Default Kali Linux Wordlists (SecLists Included)☆170Updated 6 months ago
- TryHackMe rooms, tips and tricks, and other CTF writeups☆133Updated 3 months ago
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆340Updated last week
- List of payloads: reverse shell, bind shell, webshell.☆60Updated last month
- Bookmarklet to find endpoints easily with one click☆72Updated last year
- There are many cheat sheets out there, but this is mine.☆36Updated 10 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- list of usernames and email addresses for pentests☆173Updated 3 years ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆55Updated 8 months ago
- ☆142Updated last year
- Koth - TryHackMe Tricks☆188Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆68Updated last year
- Work in progress...☆523Updated last year
- TCM Security Academy Notes☆39Updated 3 weeks ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆91Updated last year
- improving...☆250Updated 2 months ago