tkisason / vulnapi
Intentionaly very vulnerable API with bonus bad coding practices
☆40Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for vulnapi
- Target practice for ffuf☆59Updated 3 years ago
- HTTP parameter discovery suite.☆60Updated 4 years ago
- ☆47Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆111Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆27Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆88Updated last year
- The scripts I write to help me on my bug bounty hunting☆120Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆23Updated last year
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- HTTP verb tampering & methods enumeration☆52Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆128Updated 2 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- List all public repositories for (valid) GitHub usernames☆68Updated last year
- Enumerate AWS permissions and resources.☆64Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆77Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Collection's of Tech Talk that are presented by me :)☆95Updated last month
- Some contributions in the nuclei-templates repository☆55Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆141Updated this week
- Script for Bug Bounty☆28Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆50Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago