ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
-
Updated
May 21, 2024 - PHP
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
Payload Arsenal for Pentration Tester and Bug Bounty Hunters
Ruby on Rails Phishing Framework
Work in progress...
PHP shells that work on Linux OS, macOS, and Windows OS.
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Quick SQL Scanner, Dorker, Webshell injector PHP
this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.
The Black Hat Bash book repository
A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Yet Another PHP Shell - The most complete PHP reverse shell
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
Simple Powershell Http shell With WEB UI
Multi OTP Spam Amp/Paralell threads
This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).
SQL Injection - Pentesting techniques and a vulnerable Docker image for practice
Repository contains an online education portal filled with web vulnerabilities.
Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."