tanprathan / OWASP-Testing-ChecklistLinks
OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
☆1,698Updated 2 years ago
Alternatives and similar repositories for OWASP-Testing-Checklist
Users that are interested in OWASP-Testing-Checklist are comparing it to the libraries listed below
Sorting:
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,162Updated 2 years ago
- ☆1,800Updated 3 weeks ago
- Sample pentest report provided by TCM Security☆1,285Updated 3 years ago
- ☆1,123Updated last month
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,069Updated last year
- This script is intended to automate your reconnaissance process in an organized fashion☆2,000Updated 4 years ago
- ☆1,585Updated 2 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,718Updated 3 years ago
- Ressources for bug bounty hunting☆1,872Updated 2 years ago
- A script to set up a quick Ubuntu 17.10 x64 box with tools I use.☆1,230Updated last year
- The Bug Hunters Methodology☆4,179Updated 2 years ago
- Open source education content for the researcher community☆2,729Updated 3 years ago
- A tool for parsing breached passwords☆2,054Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,618Updated 4 months ago
- ☆2,298Updated last year
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,746Updated 4 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,344Updated 4 years ago
- Hack-the-Box-OSCP-Preparation☆861Updated 5 years ago
- A curated list of amazingly awesome Burp Extensions☆3,319Updated 9 months ago
- Windows / Linux Local Privilege Escalation Workshop☆2,027Updated 3 years ago
- ☆333Updated 5 years ago
- 🎯 Command Injection Payload List☆3,641Updated last year
- Compilation of Resources for TCM's Linux Privilege Escalation course☆571Updated 5 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆781Updated 5 years ago
- ☆1,140Updated 4 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,418Updated last year
- A curated list of awesome OSCP resources☆3,285Updated last year
- Find domains and subdomains related to a given domain☆3,459Updated last year
- Mind-Maps of Several Things☆2,607Updated 2 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,679Updated 3 years ago