Source code for Hacker101.com - a free online web and mobile security class.
-
Updated
Jul 6, 2021 - SCSS
{{ message }}
Source code for Hacker101.com - a free online web and mobile security class.
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
A list of resources for those interested in getting started in bug bounties
A list of web application security
nginx Docker image secure by default.
Awesome Node.js Security resources
A container repository for my public web hacks!
Fast CORS misconfiguration vulnerabilities scanner
Making Favicon.ico based Recon Great again !
A list of all FTP servers in IPv4 that allow anonymous logins.
Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Add tooltips explaining more in details what the entries in the legend mean.
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Web application vulnerability scanner
java source code static code analysis and danger function identify prog
ScanT3r - Module based Bug Bounty Automation Tool
Clear all your logs in [linux/windows] servers
A curated list of various bug bounty tools
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Awesome Object Capabilities and Capability Security
Runs the default Google Lighthouse tests with additional security tests
Python library and CLI for the Bug Bounty Recon API
Add a description, image, and links to the web-security topic page so that developers can more easily learn about it.
To associate your repository with the web-security topic, visit your repo's landing page and select "manage topics."
.well-known(RFC) is becoming an increasingly popular destination for stashing site-wide metadata. Some of that metadata is relevant to site security or may unintentionally leak information, so we should scan it.Some starting points: