snsttr / diwaLinks
A Deliberately Insecure Web Application
☆67Updated 5 years ago
Alternatives and similar repositories for diwa
Users that are interested in diwa are comparing it to the libraries listed below
Sorting:
- IDOR testing tool. Coded during Lunizz live stream.☆31Updated 5 years ago
- ☆171Updated 4 years ago
- Tips for Penetration Testing☆130Updated 2 years ago
- Privilege Escalation MindMap☆15Updated 5 years ago
- ☆11Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆37Updated last year
- ☆68Updated 5 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆12Updated 5 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆247Updated 2 months ago
- PensiveNotes - A note taking app☆43Updated 5 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- ☆457Updated 6 months ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆53Updated last week
- Short checklists for penetration testing methodology☆194Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- ☆12Updated 2 years ago
- OSCP cheatsheet☆108Updated last year
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆120Updated 3 years ago
- Cheatsheet to exploit and learn SQL Injection.☆139Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- Exploits for the TryHackMe room hackerNote☆30Updated 5 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- A collection of resources I'm using while working toward the OSCP☆78Updated 3 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 6 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆50Updated 2 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- This Repo will help you to prepare better for CEH - Practical Exam☆51Updated 2 months ago
- ☆14Updated 7 years ago
- ☆44Updated 9 years ago