OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
☆1,771Feb 9, 2023Updated 3 years ago
Alternatives and similar repositories for OWASP-Testing-Checklist
Users that are interested in OWASP-Testing-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web recon script. No need to fear, sumrecon is here!☆400Oct 10, 2022Updated 3 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,111Jun 22, 2024Updated last year
- OWASP Web Application Security Testing Checklist☆2,135Aug 18, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,390Mar 18, 2022Updated 4 years ago
- Find domains and subdomains related to a given domain☆3,609Jun 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,196Feb 8, 2024Updated 2 years ago
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆9,218Apr 24, 2026Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,731Jan 5, 2026Updated 4 months ago
- In-depth attack surface mapping and asset discovery☆14,563Apr 17, 2026Updated last month
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆13,165Updated this week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,544May 11, 2026Updated last week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,482Sep 14, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated last month
- A list of resources for those interested in getting started in bug bounties☆12,013Jul 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The Bug Hunters Methodology☆4,325Aug 1, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,937May 22, 2022Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,995Jan 28, 2026Updated 3 months ago
- A tool for parsing breached passwords☆2,112Mar 21, 2024Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆10,929Aug 2, 2024Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,445May 1, 2024Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,397Feb 17, 2026Updated 3 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,802Apr 26, 2024Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,920Sep 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,233Aug 14, 2024Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,651Jul 27, 2025Updated 9 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆806Oct 23, 2020Updated 5 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,034Aug 19, 2021Updated 4 years ago
- pwning IPv4 via IPv6☆1,908Feb 20, 2024Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,350Apr 13, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,971Updated this week
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,817Aug 6, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,742Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,668Feb 8, 2025Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,917Apr 25, 2024Updated 2 years ago
- Knock Subdomain Scan☆4,164Feb 19, 2026Updated 3 months ago
- HTTP parameter discovery suite.☆6,229Feb 20, 2025Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,737Updated this week
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆4,278Apr 22, 2026Updated last month
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,377Sep 30, 2024Updated last year