Found 96 repositories(showing 30)
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Hrishikesh7665
Delve into a comprehensive checklist, your ultimate companion for Android app penetration testing. Identify vulnerabilities in network, data, storage, and permissions effortlessly. Boost security skills with essential tools and user-friendly guides. Elevate Android security seamlessly!
alihussainzada
A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods for identifying various bugs. This guide aims to help bug hunters improve their skills in finding, verifying, and responsibly reporting security vulnerabilities.
Anof-cyber
A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities
Lianantech
Ethereum based smart contract vulnerability checklist (关于区块链以太坊安全类问题)
riteshs4hu
A comprehensive collection of resources designed to help you enhance the security of your APIs. In this repository, you'll find a wide range of wordlists, checklists, vulnerable app setups, Logger++ filters and resources dedicated to REST APIs, JSON, and GraphQL.
Secure-D
Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics with short description and recommendation. Its objective is to aid penetration tester to review the web application thoroughly.
Raunaksplanet
Biscuit's Bug Bounty Playbook is a curated hub for cybersecurity learners and bug bounty hunters. It includes tools, methodologies, writeups, vulnerable labs, YouTube channels, checklists, and platform-specific insights to help you build and sharpen your hacking skills. Perfect for beginners and pros alike.
A comprehensive checklist for identifying and mitigating cache vulnerabilities in web applications, covering web cache poisoning, deception, DNS poisoning, and CDN-specific attacks. Includes detection, testing, mitigation, and reporting tips. Ideal for security researchers and developers.
coinspect
Coinspect created a standard security checklist to provide transparent, objective insights into the most secure crypto wallets. Based on our ongoing research on web3 wallets, which unveiled multiple vulnerabilities across various vendors.
hackerassociate
iOS Penetration Testing Checklist is a comprehensive and actionable guide designed for security professionals, developers, and testers to assess the security of iOS applications. This extension provides a detailed checklist covering 50+ vulnerabilities, ensuring a thorough evaluation of your app's security posture.
iAnonymous3000
A comprehensive checklist and resource guide for auditing Solidity smart contracts for security vulnerabilities.
francescolonardo
Practical exercises and checklists to prepare for the HTB Certified Bug Bounty Hunter (CBBH) exam, focusing on real-world web application vulnerabilities, exploitation techniques, and bug bounty methodologies.
ramosslyz
This comprehensive checklist has been Created for penetration testers and bug hunters seeking to identify and exploit vulnerabilities in web applications.
valaDevs
A CheckList for web application Vulnerabilities
bmangesh
CIS Benchmark Hardening/Vulnerability Checklists
jwhenry28
A simple checklist to help improve the impact of common web vulnerabilities on penetration tests.
marbas207
A desktop tool for managing CVE disclosure workflows. Track vulnerabilities from discovery through coordinated disclosure with a Kanban board, follow-up reminders, checklists, and more.
pavankumar143-coder
A Penetration Testing Checklist for web ensures comprehensive security by systematically identifying and addressing potential vulnerabilities. It covers key areas like authentication, session management, input validation, access controls, and data encryption, enhancing overall web application security.
T0xIN19
No description available
vbrunovski
Practical guide and checklist for finding API vulnerabilities (OWASP API Top 10)
Cingulara
The Scoring API for the OpenRMF tool, lets you read stats on the status and category of STIG vulnerabilities. Also returns a score when passed the STIG checklist in a long raw string.
TrustAI-laboratory
The AI Vulnerability Assessment Framework is an open-source checklist designed to guide GenAI developer through the process of assessing the vulnerability of artificial intelligence (AI) systems to various types of attacks and security threats.
checklist for testing invitation / team-member invite flows for business-logic vulnerabilities. Use this as a GitHub-ready checklist in your repo, penetration-testing notes, or bug bounty writeups. Each item includes: What to test → Quick test steps → PoC / Request template → Expected (bad) behavior → Impact → Mitigation.
attacker-codeninja
A vulnerability assessment tool that automates bug hunting checklists for web targets
algenisromero
Cybersecurity checklists to perform vulnerabilities assessment, pentest, and other ethical hacking assessments.
capetron
Comprehensive cybersecurity audit toolkit: security assessment frameworks, penetration testing checklists, vulnerability assessment guides, and network security templates. By Petronella Technology Group.
ChiefInformationSecurityOfficer
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Vicent00
A comprehensive security knowledge base for smart contract developers and auditors. Contains practical checklists, vulnerability patterns, and best practices covering DeFi protocols, ERC standards, governance, oracles, and cross-chain security.
Dit-Developers
Android-Pentesting & CheckList is a practical guide for Android security testing, providing a structured checklist, tools, and techniques for identifying vulnerabilities in Android applications.