security-checklist / php-security-check-listLinks
PHP Security Check List [ EN ] π β£οΈ
β297Updated 5 years ago
Alternatives and similar repositories for php-security-check-list
Users that are interested in php-security-check-list are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β354Updated 3 months ago
- Sample vulnerable code and its exploit codeβ191Updated 4 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.β442Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLFβ401Updated 4 years ago
- Penetration Testing Playbook (PTP)β174Updated 6 years ago
- A collection of web pages, vulnerable to command injection flaws.β180Updated 2 years ago
- β326Updated 7 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coderβ281Updated 7 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...β232Updated 5 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersβ279Updated 6 years ago
- Pentest/BugBounty progress control with scanning modulesβ281Updated 4 years ago
- π€ Security Trivia that rare people know.β162Updated 5 years ago
- Another way to bypass WAF Cheat Sheet (draft)β426Updated 6 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yeaβ¦β80Updated 7 years ago
- Tulpar - Web Vulnerability Scannerβ201Updated 5 years ago
- Burp Suite extension to discover assets from HTTP response.β227Updated 5 months ago
- Local File Inclusion Exploitation Tool (mirror)β127Updated 8 years ago
- Fuzzing Payloads to Assist in Web Application Testing.β166Updated 6 years ago
- Some tools to automate recon - 003randomβ294Updated 7 years ago
- Facebook Bug Bountiesβ102Updated 4 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.β469Updated 5 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.β396Updated 5 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn reaβ¦β455Updated 3 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()β150Updated 9 years ago
- A collection of useful Serverless functions I use when pentestingβ387Updated 2 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is fβ¦β160Updated 3 years ago
- Awesome PHP Security Resources πΆππβ994Updated last year
- Exploitation for XSSβ718Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRFβ294Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouseβ139Updated 6 years ago