vernjan / web-security-academyLinks
Solutions for Web Security Academy
☆75Updated 6 years ago
Alternatives and similar repositories for web-security-academy
Users that are interested in web-security-academy are comparing it to the libraries listed below
Sorting:
- ☆101Updated 2 years ago
- ☆87Updated 4 years ago
- A Burp Suite extension for CSRF proof of concepts.☆58Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆236Updated 4 years ago
- An OSWE Guide☆121Updated 4 years ago
- ☆109Updated 10 months ago
- PDF slides☆246Updated 4 years ago
- ☆134Updated 5 years ago
- This repository is about @AnubhavSingh_'s 365 days of Learning Tweets collection.☆229Updated 3 years ago
- bug bounty disclosed reports☆123Updated last year
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆167Updated 3 years ago
- this html file creates a csrf poc form to any http request.☆282Updated 3 years ago
- ☆94Updated 3 months ago
- The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.☆142Updated 2 years ago
- Repository to house markdown templates for researchers☆215Updated 3 months ago
- ☆131Updated 5 years ago
- Unofficial documentation for the great tool Param Miner☆184Updated 3 years ago
- Customisable and automated HTTP header injection☆271Updated last year
- ☆240Updated 4 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆111Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆89Updated 4 years ago
- Combination of all my Resources, Links & Scripts☆295Updated 6 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- Web Application Security Testing Tools☆251Updated last year
- Automated tool for domains & subdomains gathering☆191Updated last week
- Burp Extension for easily creating Wordlists☆215Updated 4 years ago
- A bash script that will automatically install Bug Hunting tools used for recon☆178Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆325Updated last year
- GraphQL security workshop labs☆118Updated last week
- Burp extension to create target specific and tailored wordlist from burp history.☆255Updated 4 years ago