☆726Aug 8, 2025Updated 7 months ago
Alternatives and similar repositories for Web-Security-Academy-Series
Users that are interested in Web-Security-Academy-Series are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆134Aug 22, 2020Updated 5 years ago
- Hack-the-Box-OSCP-Preparation☆882Nov 22, 2020Updated 5 years ago
- A script that you can run in the background!☆185Jan 18, 2020Updated 6 years ago
- Writeups for PortSwigger WebSecurity Academy☆361Feb 5, 2023Updated 3 years ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆99Aug 28, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆19Sep 21, 2018Updated 7 years ago
- Burp Suite Certified Practitioner Exam Study☆1,356Mar 12, 2026Updated 2 weeks ago
- Top disclosed reports from HackerOne☆5,426Feb 28, 2026Updated last month
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,588Aug 6, 2023Updated 2 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- A list of resources for those interested in getting started in bug bounties☆11,915Jul 23, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,679Sep 8, 2023Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,494Mar 14, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,911Dec 8, 2025Updated 3 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated 2 weeks ago
- OSWE, OSEP, OSED, OSEE☆3,795Jan 2, 2026Updated 2 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,378Feb 10, 2024Updated 2 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆113Feb 22, 2022Updated 4 years ago
- A security research site.☆793Mar 12, 2026Updated 2 weeks ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,161May 13, 2023Updated 2 years ago
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A curated list of various bug bounty tools☆5,853Feb 9, 2026Updated last month
- ☆77Sep 27, 2024Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,364May 1, 2024Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,956Jan 28, 2026Updated 2 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,264Mar 13, 2026Updated 2 weeks ago
- ☆385Jun 30, 2021Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,064Oct 9, 2022Updated 3 years ago
- Open source education content for the researcher community☆2,759Apr 13, 2022Updated 3 years ago
- ☆1,160Apr 21, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆102Dec 16, 2021Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,124Aug 14, 2024Updated last year
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,413Sep 14, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,549Jan 18, 2026Updated 2 months ago
- Ressources for bug bounty hunting☆1,911Dec 1, 2022Updated 3 years ago