t3l3machus / OWASP-Testing-Guide-ChecklistLinks
OWASP based Web Application Security Testing Checklist
☆78Updated last year
Alternatives and similar repositories for OWASP-Testing-Guide-Checklist
Users that are interested in OWASP-Testing-Guide-Checklist are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆91Updated 5 months ago
- ☆65Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆77Updated 3 weeks ago
- ☆75Updated 4 years ago
- ☆68Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- ☆78Updated 2 years ago
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆99Updated 7 months ago
- ☆74Updated last year
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- ☆22Updated last year
- ☆56Updated 2 years ago
- ☆44Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 4 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- ☆29Updated 4 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- MayorSec DNS Enumeration Tool☆87Updated 8 months ago
- ☆92Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Updated 2 years ago
- ☆67Updated 3 years ago
- Script related in Active Directory Attacks Domain☆22Updated 2 years ago