This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
☆35Feb 10, 2024Updated 2 years ago
Alternatives and similar repositories for vulnerability-Checklist
Users that are interested in vulnerability-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Mar 3, 2025Updated last year
- ☆16Nov 13, 2024Updated last year
- ☆63Jul 14, 2025Updated 8 months ago
- CEH v13 i-labs , CEH v13 Engage Answers☆34Jul 5, 2025Updated 8 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Jun 1, 2024Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆92Feb 9, 2025Updated last year
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆24Apr 20, 2025Updated 11 months ago
- ☆27Nov 20, 2025Updated 4 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- ☆19May 18, 2025Updated 10 months ago
- ☆11Dec 27, 2024Updated last year
- ☆27Sep 5, 2025Updated 6 months ago
- 🔐 Offensive security knowledge base — 50+ docs covering web exploitation, bug bounty, privilege escalation, CTF writeups, APT emulation,…☆118Mar 14, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆18Jul 11, 2025Updated 8 months ago
- ☆13Oct 6, 2024Updated last year
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated 11 months ago
- A learning path for embedded software.☆13Feb 4, 2021Updated 5 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- ☆14Jun 19, 2024Updated last year
- ☆33Dec 8, 2025Updated 3 months ago
- ☆18Mar 7, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Aug 24, 2023Updated 2 years ago
- An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries…☆24Feb 22, 2022Updated 4 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆142Mar 28, 2025Updated 11 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆98Sep 20, 2025Updated 6 months ago
- ☆20May 28, 2024Updated last year
- A resources for who want to learn and get deep into client-side bugs☆426Dec 8, 2024Updated last year
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆65Mar 2, 2025Updated last year
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Mar 13, 2023Updated 3 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆48Mar 23, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆206Aug 13, 2024Updated last year
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆25Jun 28, 2020Updated 5 years ago
- INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes☆66Dec 28, 2024Updated last year
- 🎵 Plays some background music while Maven is building☆62Updated this week
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆110Jul 30, 2025Updated 7 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,275Feb 10, 2024Updated 2 years ago
- ☆42May 20, 2021Updated 4 years ago