security-checklist / php-security-check-listLinks
PHP Security Check List [ EN ] π β£οΈ
β298Updated 5 years ago
Alternatives and similar repositories for php-security-check-list
Users that are interested in php-security-check-list are comparing it to the libraries listed below
Sorting:
- Nano is a family of PHP web shells which are code golfed for stealth.β442Updated 5 years ago
- Sample vulnerable code and its exploit codeβ191Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β356Updated 5 months ago
- RIPS - A static source code analyser for vulnerabilities in PHP scriptsβ320Updated 3 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersβ279Updated 6 years ago
- Clear all your logs in [linux/windows] servers π‘οΈβ313Updated 4 years ago
- Bypassing disabled exec functions in PHP (c) CRLFβ404Updated 4 years ago
- A deliberately vulnerable web application for learning web application security.β132Updated 4 months ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn reaβ¦β456Updated 3 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()β151Updated 10 years ago
- Tulpar - Web Vulnerability Scannerβ202Updated 5 years ago
- Free web-application vulnerability and version scannerβ575Updated 5 months ago
- CMS Detection and Exploit Kit based on Whatcms.org APIβ257Updated 9 months ago
- A web crawler (for bug hunting) that gathers more than you can imagine.β150Updated 2 years ago
- A static analysis tool for securityβ349Updated last week
- list of sql-injection and XSS stringsβ115Updated 9 years ago
- A collection of web pages, vulnerable to command injection flaws.β179Updated 2 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.β348Updated 5 months ago
- Exploitation for XSSβ723Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)β127Updated 8 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.β223Updated last year
- π€ Security Trivia that rare people know.β162Updated 5 years ago
- Exploits for various CVEsβ211Updated 5 years ago
- A collection of web pages vulnerable to SQL injection flawsβ349Updated 3 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.β181Updated 6 years ago
- A black box, Ruby powered, Joomla vulnerability scannerβ272Updated 7 years ago
- Damn Small XSS Scannerβ432Updated 4 years ago
- Pentest/BugBounty progress control with scanning modulesβ281Updated 5 years ago
- Reverse Shell Cheat Sheet TooLβ296Updated 5 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is fβ¦β160Updated 3 years ago