roberson-io / portswigger
All PortSwigger Web Security Academy labs grouped by difficulty level
☆49Updated 3 years ago
Alternatives and similar repositories for portswigger
Users that are interested in portswigger are comparing it to the libraries listed below
Sorting:
- Advanced Reconnaissance and Web Application Discovery☆81Updated 3 years ago
- ☆83Updated 3 years ago
- Check List☆79Updated 2 years ago
- ☆50Updated 3 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- API Pentesting notes.☆97Updated 6 months ago
- ☆27Updated 5 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆54Updated 3 years ago
- Guide to SSRF☆69Updated last year
- ☆100Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- It's collection of my learning during 100 days .☆35Updated 3 years ago
- ☆94Updated 3 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Learning and hunting SQL injection bugs for 50 continuous days☆76Updated 2 years ago
- Summary of almost all paid bounty reports on H1☆40Updated 4 years ago
- ☆52Updated 4 years ago
- ☆21Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆76Updated last year
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- A Burp Suite extension for CSRF proof of concepts.☆51Updated 2 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆42Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Describe how to use ffuf different options with examples☆87Updated 2 years ago
- A Proof of Concept for Clickjacking Attacks☆55Updated 4 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆39Updated 2 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 3 years ago
- ☆52Updated last year