OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
☆1,752Feb 9, 2023Updated 3 years ago
Alternatives and similar repositories for OWASP-Testing-Checklist
Users that are interested in OWASP-Testing-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web recon script. No need to fear, sumrecon is here!☆399Oct 10, 2022Updated 3 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,105Jun 22, 2024Updated last year
- OWASP Web Application Security Testing Checklist☆2,118Aug 18, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,372Mar 18, 2022Updated 4 years ago
- Find domains and subdomains related to a given domain☆3,569Jun 7, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,181Feb 8, 2024Updated 2 years ago
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆9,066Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,679Jan 5, 2026Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆14,353Apr 1, 2026Updated last week
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,868Updated this week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,493Mar 22, 2026Updated 3 weeks ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,416Sep 14, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- The Bug Hunters Methodology☆4,273Aug 1, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A list of resources for those interested in getting started in bug bounties☆11,956Jul 23, 2024Updated last year
- A Tool for Domain Flyovers☆5,921May 22, 2022Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,964Jan 28, 2026Updated 2 months ago
- A tool for parsing breached passwords☆2,103Mar 21, 2024Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆10,871Aug 2, 2024Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,383May 1, 2024Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,389Feb 17, 2026Updated last month
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,794Apr 26, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,889Sep 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,153Aug 14, 2024Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,650Jul 27, 2025Updated 8 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,030Aug 19, 2021Updated 4 years ago
- pwning IPv4 via IPv6☆1,901Feb 20, 2024Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆4,322Apr 13, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,632Aug 6, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,618Feb 8, 2025Updated last year
- Knock Subdomain Scan☆4,153Feb 19, 2026Updated last month
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,691Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆4,224Jan 21, 2026Updated 2 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,366Sep 30, 2024Updated last year