All Projects → Aju100 → VulWebaju

Aju100 / VulWebaju

Licence: MIT license
VulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to VulWebaju

Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+7207.55%)
Mutual labels:  penetration-testing, bugbounty
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+167.92%)
Mutual labels:  penetration-testing, bugbounty
crtfinder
Fast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
Stars: ✭ 96 (+81.13%)
Mutual labels:  penetration-testing, bugbounty
vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Stars: ✭ 674 (+1171.7%)
Mutual labels:  bugbounty, owasp-top-10
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-15.09%)
Mutual labels:  penetration-testing, bugbounty
3klcon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (+256.6%)
Mutual labels:  penetration-testing, bugbounty
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+215.09%)
Mutual labels:  penetration-testing, bugbounty
Awesome Vulnerable Apps
Awesome Vulnerable Applications
Stars: ✭ 180 (+239.62%)
Mutual labels:  penetration-testing, bugbounty
urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+292.45%)
Mutual labels:  penetration-testing, bugbounty
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-71.7%)
Mutual labels:  penetration-testing, bugbounty
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (+252.83%)
Mutual labels:  penetration-testing, bugbounty
cent
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+494.34%)
Mutual labels:  penetration-testing, bugbounty
Garud
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
Stars: ✭ 183 (+245.28%)
Mutual labels:  penetration-testing, bugbounty
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+258.49%)
Mutual labels:  penetration-testing, bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+243.4%)
Mutual labels:  penetration-testing, bugbounty
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+454.72%)
Mutual labels:  penetration-testing, bugbounty
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (+164.15%)
Mutual labels:  penetration-testing, bugbounty
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (+205.66%)
Mutual labels:  penetration-testing, bugbounty
KaliIntelligenceSuite
Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (+9.43%)
Mutual labels:  penetration-testing, bugbounty
bug-bounty
My personal bug bounty toolkit.
Stars: ✭ 127 (+139.62%)
Mutual labels:  penetration-testing, bugbounty
____   ____    .__  __      __      ___.               __
\   \ /   /_ __|  |/  \    /  \ ____\_ |__ _____      |__|__ __
 \   Y   /  |  \  |\   \/\/   // __ \| __ \__  \     |  |  |   |
  \     /|  |  /  |_\        /\  ___/| \_\ \/ __ \_   |  |  |  /
   \___/ |____/|____/\__/\  /  \___  >___  (____  /\__|  |____/
                          \/       \/    \/     \/\______|


VulWebaju is a script that automates to set up your pentesting environment for learning purpose. This script will help you to install common vulnerable applications.

Note: This script is only tested in Ubuntu. You can also use in multiple cloud providers(EC2,Google Compute Engine, Azure virual machines, DigitalOcean Droplets).

Vulnerables webapps that you can install

Installation

git clone https://github.com/Aju100/VulWebaju
cd VulWebaju
sudo ./install.sh

Make sure you have installed Docker.

sudo apt update -y
sudo apt install git
sudo apt install docker.io -y
sudo systemctl start docker
sudo systemctl enable docker
sudo curl -L "https://github.com/docker/compose/releases/download/1.29.0/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
sudo chmod +x /usr/local/bin/docker-compose

You can use also call install_requirements function via install.sh script to install all requirements.

Other labs

You can also try other labs if you are interested in learning.

Contribute

Contributions are always welcome! Please read the contribution guidelines first.

Help

If you need any help anywhere in the process, you can open Github issue.

License

This project is currently licensed under the MIT General Public License v3. i.e. we guarantee end users the freedom to run, study, share, and modify the software.

Made with ❤️ and Bash

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].