selimwdev / WAPTLabLinks
WAPTLab - Web Application Penetration Testing Lab
☆62Updated 3 weeks ago
Alternatives and similar repositories for WAPTLab
Users that are interested in WAPTLab are comparing it to the libraries listed below
Sorting:
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆88Updated 10 months ago
- ☆61Updated 5 months ago
- ☆19Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆139Updated last year
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆66Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Updated 2 years ago
- ☆14Updated 9 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- ☆15Updated 2 years ago
- DoomScope framework - Automated Web Security/Recon Scanner☆58Updated this week
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆55Updated 4 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆96Updated 3 months ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆52Updated 8 months ago
- ☆21Updated last year
- ☆20Updated 3 months ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆21Updated 6 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆329Updated 7 months ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance, …☆24Updated last year
- ☆27Updated 3 years ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆13Updated 3 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆111Updated last year
- Bug Bounty Platforms☆26Updated last year
- ☆25Updated 3 years ago
- A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, inte…☆13Updated 2 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Updated 3 months ago
- ☆18Updated 5 months ago
- ☆22Updated last year
- ☆220Updated 2 months ago
- My Private Bug Hunting Methodology☆310Updated last year
- ☆26Updated last year