CheatSheetSeries
dirsearch
Our great sponsors
CheatSheetSeries | dirsearch | |
---|---|---|
49 | 12 | |
26,237 | 11,086 | |
2.3% | - | |
9.1 | 7.9 | |
5 days ago | 26 days ago | |
Python | Python | |
Creative Commons Attribution Share Alike 4.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CheatSheetSeries
-
Next.js: consequence of AppRouter on your CSP
Cross Site Scripting Prevention Cheat Sheet from OWASP Cheat Sheet Series
-
A guide to Auth & Access Control in web apps 🔐
OWasp cheat sheet on how to do ACL in Web App.
- Ask HN: Best Practices Guides You're Aware Of
- What are some senior level learning resources you recommend for improving as a backend engineer?
-
OWASP Needs to Evolve
They didn’t reintroduce the error; it was never completely fixed. I created an issue for it. https://github.com/OWASP/CheatSheetSeries/issues/1089
-
I made a mistake and my account was compromised. What can I do after?
The main reason I'm giving this guy some credence to is that his analysis of KDF cost is the source used for the OWASP Cheatsheet on password hashing. In addition, several trusted infosec regulars are among his 613 followers on Mastodon.
-
Permissions (access control) in web apps
OWasp cheat sheet on how to do ACL in Web App.
-
Don't Tackle Security Alone: A Beginner's Guide To OWASP
OWASP Cheat Sheet Series
-
Complete Guide to Multi-Provider OAuth 2 Authorization in Node.js
Session Management Cheatsheet
dirsearch
-
The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
DirSearch
-
Pentesting Tools I Use Everyday
Learn more about dirsearch here: https://github.com/maurosoria/dirsearch
-
Mapping your AWS attack surface
Empowered with a list of all the exposed URLs in your organization, you can then set up a process to scan these using a number of web-focused Dynamic Application Security Testing (DAST) tools and scanners such as Zed Attack Proxy, dirsearch (Web path scanner), Aquatone, and Nikto2. The OWASP® Foundation maintains a full list of scanning tools that could be used.
-
Millions of .git folders exposed publicly by mistake
Scan our domains and infrastructure to reveal if we have exposed.git repositories and other critical infrastructure. You can scan your domains and subdomains with many tools such as Amass or dirsearch to name a couple.
- recommended tools that do not come with Kali
- How to choose a web path scanner? [closed]
-
Tools and Skills to be the Bug Bounty Hunting.
dirsearch:
What are some alternatives?
gobuster - Directory/File, DNS and VHost busting tool written in Go
WhatWeb - Next generation web scanner
hacktricks - Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Bitcoin-wallet-cracker - Automated Bitcoin wallet generator that with mnemonic and passphrases bruteforces wallet addresses
webpack - A bundler for javascript and friends. Packs many modules into a few bundled assets. Code Splitting allows for loading parts of the application on demand. Through "loaders", modules can be CommonJs, AMD, ES6 modules, CSS, Images, JSON, Coffeescript, LESS, ... and your custom stuff.
asleep_scanner - Dahua DVRs bruteforcer at port 37777
IPRotate_Burp_Extension - Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
big-list-of-naughty-strings - The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
stegseek - :zap: Worlds fastest steghide cracker, chewing through millions of passwords per second :zap:
opentaal-wordlist - 🇳🇱🇧🇪🇸🇷 Dutch word list by OpenTaal
docker-socket-proxy - Proxy over your Docker socket to restrict which requests it accepts
django-mfa2 - A Django app that handles MFA, it supports TOTP, U2F, FIDO2 U2F (Webauthn), Email Token and Trusted Devices