yeswehack / vulnerable-code-snippets
Twitter vulnerable snippets
☆995Updated last month
Alternatives and similar repositories for vulnerable-code-snippets:
Users that are interested in vulnerable-code-snippets are comparing it to the libraries listed below
- Burp Suite Certified Practitioner Exam Study☆1,026Updated last month
- A small collection of vulnerable code snippets☆735Updated 6 months ago
- ☆1,121Updated last year
- Real-world infosec wordlists, updated regularly☆1,484Updated this week
- A repository that includes all the important wordlists used while bug hunting.☆1,282Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,050Updated last week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆869Updated last year
- Awesome Vulnerable Applications☆1,163Updated 8 months ago
- A list of open source web security scanners☆1,076Updated last month
- ☆615Updated 8 months ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆836Updated 2 years ago
- A OWASP Based Checklist With 500+ Test Cases☆729Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,530Updated 11 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆971Updated 10 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,140Updated 8 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,345Updated this week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,032Updated last month
- Watch the latest awesome security talks around the globe☆274Updated 2 months ago
- ChatGPT Prompts for Bug Bounty & Pentesting☆606Updated last year
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,234Updated last week
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆538Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆865Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,884Updated last year
- oneliner commands for bug bounties☆444Updated 2 years ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,458Updated 2 years ago
- ☆1,678Updated last week
- ☆700Updated 6 months ago
- Ressources for bug bounty hunting☆1,814Updated 2 years ago
- ☆523Updated 3 years ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆900Updated last year