wtsxDev / List-of-web-application-security
List of web application security
☆165Updated 8 years ago
Alternatives and similar repositories for List-of-web-application-security
Users that are interested in List-of-web-application-security are comparing it to the libraries listed below
Sorting:
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated last week
- Resources for learning about application security☆56Updated 8 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Github for the scripts utilised during Penetration test☆234Updated 7 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- useful pentest note☆66Updated last month
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- Scripts that are useful for me on pen tests☆530Updated 2 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆90Updated 3 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆146Updated 6 years ago
- Resource for developing infosec skills for OSCP☆114Updated 10 months ago
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- Damn Vulnerable eXtensive Training Environment☆105Updated 3 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆199Updated 7 years ago
- ☆93Updated 7 years ago
- Notes/Tools for pentesting☆82Updated last year
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Local File Inclusion Exploitation Tool (mirror)☆125Updated 8 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- ☆92Updated 6 years ago
- Collection of social engineering payloads☆296Updated 7 years ago