tcpiplab / Web-App-Hacking-NotesLinks
Notes I've taken while working through various web app pentesting labs.
☆93Updated 7 years ago
Alternatives and similar repositories for Web-App-Hacking-Notes
Users that are interested in Web-App-Hacking-Notes are comparing it to the libraries listed below
Sorting:
- Facebook Bug Bounties☆103Updated 4 years ago
- Finds all public bug reports on reported on Hackerone☆93Updated 9 years ago
- Fuzzing for LFI using Burpsuite☆63Updated 8 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- Collection of Bug Bounty Tips☆64Updated 5 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- An entry level resource to learning bug bounty.☆27Updated 7 years ago
- Resolve and quickly portscan a list of (sub)domains.☆87Updated 9 years ago
- ☆18Updated 7 years ago
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆105Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆227Updated 6 months ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- XSS Hunter Burp Plugin☆150Updated 6 years ago
- Bodhi - Client-side Vulnerability Playground☆121Updated 4 years ago
- Damn Vulnerable eXtensive Training Environment☆105Updated 3 years ago
- ☆47Updated 5 years ago
- ☆121Updated 8 years ago
- Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQL…☆61Updated 8 years ago
- CVE-2017-9506 - SSRF☆189Updated 3 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆48Updated 3 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- This repo contains resources to help learn and understand penetration testing☆15Updated 7 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- subdomain bruteforce list☆101Updated 9 months ago
- A Cross Site Scripting scanner using selenium webdriver☆54Updated 5 years ago