A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Jan 24, 2023 - Python
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Web path scanner
A list of resources for those interested in getting started in bug bounties
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
OneForAll是一款功能强大的子域收集工具
Community curated list of templates for the nuclei engine to find security vulnerabilities.
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Collection of methodology and test case for various web vulnerabilities.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A Workflow Engine for Offensive Security
All about bug bounty (bypasses, payloads, and etc)
Automated All-in-One OS Command Injection Exploitation Tool.
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities