snyk-labs / exploit-workshop
A step by step workshop to exploit various vulnerabilities in Node.js and Java applications
☆156Updated last year
Alternatives and similar repositories for exploit-workshop:
Users that are interested in exploit-workshop are comparing it to the libraries listed below
- You can read the writeup on this script here☆193Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆352Updated 4 years ago
- Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomai…☆222Updated 4 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 5 years ago
- Various Payload wordlists☆235Updated 4 years ago
- ☆44Updated 4 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆191Updated 4 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆105Updated 6 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated last year
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated 2 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆258Updated 2 years ago
- The Bug Bounty Wiki☆172Updated 6 years ago
- ☆173Updated 2 years ago
- Burp Suite Extension to monitor new scope☆197Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- Everything you need about Burp Extension Generation☆153Updated 2 years ago
- ☆148Updated 3 years ago
- HackerOne Wallpapers☆73Updated 4 years ago
- Sample vulnerable code and its exploit code☆190Updated 4 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆240Updated 5 years ago
- Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.☆149Updated 4 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆104Updated 2 years ago
- vulnerable single sign on☆147Updated 8 months ago
- Trying to make automated recon for bug bounties☆253Updated 3 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆101Updated 5 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆286Updated 3 months ago