There are 9 repositories under websec topic.
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Pwnable|Web Security|Cryptography CTF-style challenges
Discover hidden debugging parameters and uncover web application secrets
🎯 CSV Injection Payloads
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
🎯 Directory Payload List
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
Some good resources for getting started with application security
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
▲ SEO Middleware • Web Analytics • Web CRON • WebSec • HTTP & SNMP Monitoring • ostr.io is a unified web-services platform
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Additional Resources For Securing The Stack Tutorials
CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.
Repository for my GitBook (CTF writeups / vuln research / bugbounty)
Rule packs for Signal Sciences power rules platform.
The Clara S. Traversal's classroom is an intermediate level web security challenge (black box) where you will have to exploit both client-side and server-side vulnerability in order to change a student grade. Can you hack the class and get in? Access teacher only features? Do even more than the teacher can? Good luck!
VulnCode: Secure Code Review Training -- This application allows the user to practice identifying vulnerabilities within codeblocks. Each codeblock was engineered to contain a single vulnerability. There are three difficulty levels. Each exercise contains a detailed explanation which becomes available after a correct answer or three wrong answers.
Automatically exploit time-based blind SQL injection vulnerabilities
Lists of elements that compose HTML and SVG structure to fuzz in security testing checks
Extract endpoints from stdin or files.
A collection of small web-security challenges
Writeups for Over The Wire wargames, for total security noobs.
🔍 Explore a comprehensive collection of cybersecurity interview questions and answers, designed for all positions in the field.