All Projects → six2dez → Wahh_extras

six2dez / Wahh_extras

The Web Application Hacker's Handbook - Extra Content

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Wahh extras

Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+224.07%)
Mutual labels:  hacking, pentest, hacker
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-36.68%)
Mutual labels:  hacking, pentest, hacker
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-3.5%)
Mutual labels:  hacking, hacker
Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (-31.07%)
Mutual labels:  hacking, pentest
Reverseapk
Quickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-2.1%)
Mutual labels:  hacking, pentest
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (-3.5%)
Mutual labels:  hacking, pentest
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+718.46%)
Mutual labels:  hacking, pentest
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (-26.4%)
Mutual labels:  hacking, hacker
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-43.46%)
Mutual labels:  hacking, hacker
Cve 2019 0708
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-18.22%)
Mutual labels:  hacking, pentest
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-23.36%)
Mutual labels:  hacking, pentest
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+875%)
Mutual labels:  hacking, pentest
pentest-notes
渗透测试☞经验/思路/总结/想法/笔记
Stars: ✭ 734 (+71.5%)
Mutual labels:  pentest, hacker
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-75.47%)
Mutual labels:  application, hacking
Thechoice
The linux choice collection tools
Stars: ✭ 245 (-42.76%)
Mutual labels:  hacking, hacker
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-28.74%)
Mutual labels:  hacking, hacker
Pentesterspecialdict
渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Stars: ✭ 391 (-8.64%)
Mutual labels:  pentest, hacker
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+595.56%)
Mutual labels:  hacking, hacker
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+568.69%)
Mutual labels:  hacking, pentest
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (-27.34%)
Mutual labels:  hacking, hacker

wahh_extras

The Web Application Hacker's Handbook - Extra Content

For all of you who have read "The web application hacker's handbook vol2", there are several references to extras, questions, source code that are not easy to found. I've collected all in this repository.

You can support this work buying me a coffee:

TOC

  • Web applications pentesting
    • Book Index
    • Answers
      • Chapter 2 – Core Defense Mechanisms
      • Chapter 3 – Web Application Technologies
      • Chapter 4 – Mapping the Application
      • Chapter 5 – Bypassing Client-Side Controls
      • Chapter 6 – Attacking Authentication
      • Chapter 7 – Attacking Session Management
      • Chapter 8 – Attacking Access Controls
      • Chapter 9 – Attacking Data Stores
      • Chapter 10 – Attacking Back-End Components
      • Chapter 11 – Attacking Application Logic
      • Chapter 12 – Attacking Users: Cross-Site Scripting
      • Chapter 13 – Attacking Users: Other Techniques
      • Chapter 14 – Automating Customized Attacks
      • Chapter 15 – Exploiting Information Disclosure
      • Chapter 16 – Attacking Native Compiled Applications
      • Chapter 17 – Attacking Application Architecture
      • Chapter 18 – Attacking the Application Server
      • Chapter 19 – Finding Vulnerabilities in Source Code
    • Source Code
      • Chapter 14
    • Tools
      • Proxy / spider tool suites
      • Browser extensions (Firefox)
      • Browser extensions (Internet Explorer)
      • Java
      • ActiveX
      • Flash
      • Vulnerability scanners
      • Miscellaneous
    • Web Applicattion attack checklist
      • Recon and analysis
      • Test handling of access
      • Test handling of input
      • Test application logic
      • Assess application hosting
      • Miscellaneous tests

Stargazers over time

Stargazers over time

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].