OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
☆1,763Feb 9, 2023Updated 3 years ago
Alternatives and similar repositories for OWASP-Testing-Checklist
Users that are interested in OWASP-Testing-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web recon script. No need to fear, sumrecon is here!☆398Oct 10, 2022Updated 3 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,109Jun 22, 2024Updated last year
- OWASP Web Application Security Testing Checklist☆2,124Aug 18, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,380Mar 18, 2022Updated 4 years ago
- Find domains and subdomains related to a given domain☆3,589Jun 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,189Feb 8, 2024Updated 2 years ago
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆9,169Apr 24, 2026Updated last week
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Dec 22, 2016Updated 9 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,700Jan 5, 2026Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆14,484Apr 17, 2026Updated 2 weeks ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆13,033Apr 23, 2026Updated last week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,529Mar 22, 2026Updated last month
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,463Sep 14, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Bug Hunters Methodology☆4,312Aug 1, 2023Updated 2 years ago
- A list of resources for those interested in getting started in bug bounties☆11,985Jul 23, 2024Updated last year
- A Tool for Domain Flyovers☆5,927May 22, 2022Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,982Jan 28, 2026Updated 3 months ago
- A tool for parsing breached passwords☆2,107Mar 21, 2024Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆10,887Aug 2, 2024Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,414May 1, 2024Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,392Feb 17, 2026Updated 2 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,799Apr 26, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,905Sep 6, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,197Aug 14, 2024Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,654Jul 27, 2025Updated 9 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆803Oct 23, 2020Updated 5 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,033Aug 19, 2021Updated 4 years ago
- pwning IPv4 via IPv6☆1,904Feb 20, 2024Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,334Apr 13, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,771Aug 6, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,639Feb 8, 2025Updated last year
- Knock Subdomain Scan☆4,161Feb 19, 2026Updated 2 months ago
- HTTP parameter discovery suite.☆6,209Feb 20, 2025Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,711Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,885Apr 25, 2024Updated 2 years ago
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆4,253Apr 22, 2026Updated last week