security-checklist / php-security-check-listLinks
PHP Security Check List [ EN ] π β£οΈ
β298Updated 5 years ago
Alternatives and similar repositories for php-security-check-list
Users that are interested in php-security-check-list are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β356Updated 7 months ago
- Nano is a family of PHP web shells which are code golfed for stealth.β443Updated 5 years ago
- Sample vulnerable code and its exploit codeβ189Updated 4 years ago
- RIPS - A static source code analyser for vulnerabilities in PHP scriptsβ322Updated 3 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersβ276Updated 6 years ago
- Bypassing disabled exec functions in PHP (c) CRLFβ404Updated 5 years ago
- A deliberately vulnerable web application for learning web application security.β137Updated 5 months ago
- Free web-application vulnerability and version scannerβ574Updated 7 months ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()β152Updated 10 years ago
- Pentest/BugBounty progress control with scanning modulesβ281Updated 5 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn reaβ¦β456Updated 3 years ago
- list of sql-injection and XSS stringsβ115Updated 9 years ago
- Tulpar - Web Vulnerability Scannerβ203Updated 5 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built inβ¦β132Updated 5 years ago
- Some tools to automate recon - 003randomβ293Updated 7 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.β352Updated 7 months ago
- A collection of useful Serverless functions I use when pentestingβ389Updated 2 years ago
- A web crawler (for bug hunting) that gathers more than you can imagine.β151Updated 2 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is fβ¦β159Updated 3 years ago
- Exploits for various CVEsβ211Updated 5 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coderβ282Updated 8 years ago
- β328Updated 7 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...β234Updated 5 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.β229Updated 6 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yeaβ¦β80Updated 7 years ago
- A collection of web pages, vulnerable to command injection flaws.β179Updated 2 years ago
- π€ Security Trivia that rare people know.β162Updated 5 years ago
- Penetration Testing Playbook (PTP)β175Updated 6 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.β259Updated 4 months ago
- Toolset for detecting reflected xss in websitesβ115Updated 7 years ago