vernjan / web-security-academyLinks
Solutions for Web Security Academy
☆74Updated 5 years ago
Alternatives and similar repositories for web-security-academy
Users that are interested in web-security-academy are comparing it to the libraries listed below
Sorting:
- An OSWE Guide☆117Updated 4 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆162Updated 3 years ago
- ☆132Updated 4 years ago
- ☆86Updated 4 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆107Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆235Updated 3 years ago
- ☆101Updated 2 years ago
- ☆130Updated 5 years ago
- Web Application Security Testing Tools☆251Updated last year
- ☆238Updated 4 years ago
- This repository is about @AnubhavSingh_'s 365 days of Learning Tweets collection.☆229Updated 2 years ago
- this html file creates a csrf poc form to any http request.☆281Updated 2 years ago
- ☆97Updated 3 weeks ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆127Updated 2 years ago
- Customisable and automated HTTP header injection☆270Updated last year
- ☆108Updated 7 months ago
- PDF slides☆246Updated 4 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆118Updated 4 years ago
- Burp Payloads☆111Updated 8 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆74Updated 3 years ago
- Top disclosed reports from HackerOne☆161Updated 4 years ago
- ☆117Updated 3 years ago
- bug bounty disclosed reports☆121Updated 9 months ago
- All Things Bug Bounty☆116Updated 3 years ago
- My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!☆82Updated 4 months ago
- BugBounty_CheatSheet☆258Updated 2 years ago
- Automated tool for domains & subdomains gathering☆190Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆147Updated 5 years ago
- Path Traversal Vulnerability Payload List☆77Updated 2 years ago