security-checklist / php-security-check-listLinks
PHP Security Check List [ EN ] π β£οΈ
β296Updated 5 years ago
Alternatives and similar repositories for php-security-check-list
Users that are interested in php-security-check-list are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β356Updated 7 months ago
- Nano is a family of PHP web shells which are code golfed for stealth.β446Updated 5 years ago
- Sample vulnerable code and its exploit codeβ189Updated 4 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersβ276Updated 7 years ago
- Clear all your logs in [linux/windows] servers π‘οΈβ315Updated 4 years ago
- Bypassing disabled exec functions in PHP (c) CRLFβ404Updated 5 years ago
- CMS Detection and Exploit Kit based on Whatcms.org APIβ256Updated 11 months ago
- Free web-application vulnerability and version scannerβ574Updated 7 months ago
- Tulpar - Web Vulnerability Scannerβ203Updated 5 years ago
- Penetration Testing Playbook (PTP)β175Updated 6 years ago
- RIPS - A static source code analyser for vulnerabilities in PHP scriptsβ322Updated 3 years ago
- Pentest/BugBounty progress control with scanning modulesβ282Updated 5 years ago
- Fast subdomain bruteforce enumerator in PHP 7.1β34Updated 8 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn reaβ¦β456Updated 3 years ago
- A web crawler (for bug hunting) that gathers more than you can imagine.β151Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...β234Updated 5 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()β152Updated 10 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing andβ¦β276Updated last year
- A deliberately vulnerable web application for learning web application security.β139Updated 6 months ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.β180Updated 6 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applicaβ¦β481Updated 7 years ago
- π€ Security Trivia that rare people know.β162Updated 5 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.β352Updated 7 months ago
- Reverse Shell Cheat Sheet TooLβ298Updated 5 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.β218Updated 2 years ago
- Local File Inclusion Exploitation Tool (mirror)β127Updated 8 years ago
- An automatic XSS discovery toolβ402Updated 7 years ago
- A collection of web pages vulnerable to SQL injection flawsβ351Updated 3 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is fβ¦β158Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.β469Updated 5 years ago