OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
☆1,738Feb 9, 2023Updated 3 years ago
Alternatives and similar repositories for OWASP-Testing-Checklist
Users that are interested in OWASP-Testing-Checklist are comparing it to the libraries listed below
Sorting:
- Web recon script. No need to fear, sumrecon is here!☆397Oct 10, 2022Updated 3 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,088Jun 22, 2024Updated last year
- OWASP Web Application Security Testing Checklist☆2,101Aug 18, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,330Mar 18, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,150Feb 8, 2024Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,650Jan 5, 2026Updated last month
- Find domains and subdomains related to a given domain☆3,530Jun 7, 2024Updated last year
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆8,888Updated this week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,382Nov 24, 2025Updated 3 months ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,382Sep 14, 2023Updated 2 years ago
- In-depth attack surface mapping and asset discovery☆14,159Feb 22, 2026Updated last week
- The Bug Hunters Methodology☆4,260Aug 1, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,906May 22, 2022Updated 3 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,014Aug 19, 2021Updated 4 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,576Updated this week
- A list of resources for those interested in getting started in bug bounties☆11,867Jul 23, 2024Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,330May 1, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,917Jan 28, 2026Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,369Feb 17, 2026Updated last week
- Fast subdomains enumeration tool for penetration testers☆10,830Aug 2, 2024Updated last year
- A tool for parsing breached passwords☆2,091Mar 21, 2024Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,774Apr 26, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,082Aug 14, 2024Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,643Jul 27, 2025Updated 7 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,759Apr 25, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,350Sep 30, 2024Updated last year
- Knock Subdomain Scan☆4,134Feb 19, 2026Updated last week
- A python script that finds endpoints in JavaScript files☆4,286Apr 13, 2024Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,651Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,842Sep 6, 2023Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,565Feb 8, 2025Updated last year
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,903Sep 27, 2021Updated 4 years ago
- List of Awesome Red Teaming Resources☆7,788Dec 28, 2023Updated 2 years ago
- A collection of hacks and one-off scripts☆2,424Mar 13, 2025Updated 11 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,551Aug 6, 2023Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,831Nov 10, 2023Updated 2 years ago