The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.
☆78Oct 16, 2019Updated 6 years ago
Alternatives and similar repositories for OWASP-Testing-Guide-v5
Users that are interested in OWASP-Testing-Guide-v5 are comparing it to the libraries listed below
Sorting:
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- ☆10May 6, 2017Updated 8 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆44Aug 5, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- ☆11Jan 23, 2025Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- random notes☆47Jul 9, 2025Updated 7 months ago
- ☆29Jan 15, 2017Updated 9 years ago
- Obsidian vault notes collection on Ethical Hacking Tools and Techniques, HackTheBox, and HTB Academy☆10Aug 15, 2023Updated 2 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- ExtractSubdomainFromFDNS, updating☆33Sep 5, 2019Updated 6 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Aug 10, 2022Updated 3 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- ☆18Jul 9, 2020Updated 5 years ago
- AWS security checklist for myself☆16Mar 12, 2018Updated 7 years ago
- BugBuntu Linux☆15May 21, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Aug 13, 2025Updated 6 months ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Mar 26, 2024Updated last year
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated last month
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Feb 18, 2017Updated 9 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- My cyber security notes.☆14Feb 22, 2025Updated last year