GithubHelp home page GithubHelp logo

qazbnm456 / awesome-web-security Goto Github PK

View Code? Open in Web Editor NEW
10.8K 377.0 1.6K 861 KB

๐Ÿถ A curated list of Web Security materials and resources.

Home Page: https://awesomelists.top/#/repos/qazbnm456/awesome-web-security

awesome-list awesome list web security websecurity penetration-testing

awesome-web-security's Introduction

Awesome Web Security Awesome

๐Ÿถ Curated list of Web Security materials and resources.

Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this happen so often? There can be many factors involved including misconfiguration, shortage of engineers' security skills, etc. To combat this, here is a curated list of Web Security materials and resources for learning cutting edge penetration techniques, and I highly encourage you to read this article "So you want to be a web security researcher?" first.

Please read the contribution guidelines before contributing.


๐ŸŒˆ Want to strengthen your penetration skills?
I would recommend playing some awesome-ctfs.


If you enjoy this awesome list and would like to support it, check out my Patreon page :)
Also, don't forget to check out my repos ๐Ÿพ or say hi on my Twitter!

Contents

Digests

Forums

Introduction

XSS - Cross-Site Scripting

Prototype Pollution

CSV Injection

SQL Injection

Command Injection

ORM Injection

FTP Injection

XXE - XML eXternal Entity

CSRF - Cross-Site Request Forgery

Clickjacking

SSRF - Server-Side Request Forgery

Web Cache Poisoning

Relative Path Overwrite

Open Redirect

Security Assertion Markup Language (SAML)

Upload

Rails

AngularJS

ReactJS

SSL/TLS

Webmail

NFS

AWS

Azure

Fingerprint

Sub Domain Enumeration

Crypto

Web Shell

OSINT

DNS Rebinding

Deserialization

OAuth

JWT

Evasions

XXE

CSP

WAF

JSMVC

Authentication

Tricks

CSRF

Clickjacking

Remote Code Execution

XSS

SQL Injection

NoSQL Injection

FTP Injection

XXE

SSRF

Web Cache Poisoning

Header Injection

URL

Deserialization

OAuth

Others

Browser Exploitation

Frontend (like SOP bypass, URL spoofing, and something like that)

Backend (core of Browser implementation, and often refers to C or C++ part)

PoCs

Database

Cheetsheets

Tools

Auditing

Command Injection

Reconnaissance

OSINT - Open-Source Intelligence

  • Shodan - Shodan is the world's first search engine for Internet-connected devices by @shodanhq.
  • Censys - Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet by University of Michigan.
  • urlscan.io - Service which analyses websites and the resources they request by @heipei.
  • ZoomEye - Cyberspace Search Engine by @zoomeye_team.
  • FOFA - Cyberspace Search Engine by BAIMAOHUI.
  • NSFOCUS - THREAT INTELLIGENCE PORTAL by NSFOCUS GLOBAL.
  • Photon - Incredibly fast crawler designed for OSINT by @s0md3v.
  • FOCA - FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans by ElevenPaths.
  • SpiderFoot - Open source footprinting and intelligence-gathering tool by @binarypool.
  • xray - XRay is a tool for recon, mapping and OSINT gathering from public networks by @evilsocket.
  • gitrob - Reconnaissance tool for GitHub organizations by @michenriksen.
  • GSIL - Github Sensitive Information Leakage๏ผˆGithubๆ•ๆ„Ÿไฟกๆฏๆณ„้œฒ๏ผ‰by @FeeiCN.
  • raven - raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin by @0x09AL.
  • ReconDog - Reconnaissance Swiss Army Knife by @s0md3v.
  • Databases - start.me - Various databases which you can use for your OSINT research by @technisette.
  • peoplefindThor - the easy way to find people on Facebook by [postkassen](mailto:[email protected]?subject=peoplefindthor.dk comments).
  • tinfoleak - The most complete open-source tool for Twitter intelligence analysis by @vaguileradiaz.
  • Raccoon - High performance offensive security tool for reconnaissance and vulnerability scanning by @evyatarmeged.
  • Social Mapper - Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf) by @SpiderLabs.
  • espi0n/Dockerfiles - Dockerfiles for various OSINT tools by @espi0n.

Sub Domain Enumeration

Code Generating

Fuzzing

  • wfuzz - Web application bruteforcer by @xmendez.
  • charsetinspect - Script that inspects multi-byte character sets looking for characters with specific user-defined properties by @hack-all-the-things.
  • IPObfuscator - Simple tool to convert the IP to a DWORD IP by @OsandaMalith.
  • domato - DOM fuzzer by @google.
  • FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
  • dirhunt - Web crawler optimized for searching and analyzing the directory structure of a site by @nekmo.
  • ssltest - Online service that performs a deep analysis of the configuration of any SSL web server on the public internet. Provided by Qualys SSL Labs.
  • fuzz.txt - Potentially dangerous files by @Bo0oM.

Scanning

  • wpscan - WPScan is a black box WordPress vulnerability scanner by @wpscanteam.
  • JoomlaScan - Free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan by @drego85.
  • WAScan - Is an open source web application security scanner that uses "black-box" method, created by @m4ll0k.
  • Nuclei - Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use by @projectdiscovery.

Penetration Testing

Offensive

XSS - Cross-Site Scripting

  • beef - The Browser Exploitation Framework Project by beefproject.
  • JShell - Get a JavaScript shell with XSS by @s0md3v.
  • XSStrike - XSStrike is a program which can fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs by @s0md3v.
  • xssor2 - XSS'OR - Hack with JavaScript by @evilcos.
  • csp evaluator - A tool for evaluating content-security-policies by Csper.

SQL Injection

  • sqlmap - Automatic SQL injection and database takeover tool.

Template Injection

  • tplmap - Code and Server-Side Template Injection Detection and Exploitation Tool by @epinna.

XXE

Cross Site Request Forgery

Server-Side Request Forgery

Leaking

Detecting

  • sqlchop - SQL injection detection engine by chaitin.
  • xsschop - XSS detection engine by chaitin.
  • retire.js - Scanner detecting the use of JavaScript libraries with known vulnerabilities by @RetireJS.
  • malware-jail - Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction by @HynekPetrak.
  • repo-supervisor - Scan your code for security misconfiguration, search for passwords and secrets.
  • bXSS - bXSS is a simple Blind XSS application adapted from cure53.de/m by @LewisArdern.
  • OpenRASP - An open source RASP solution actively maintained by Baidu Inc. With context-aware detection algorithm the project achieved nearly no false positives. And less than 3% performance reduction is observed under heavy server load.
  • GuardRails - A GitHub App that provides security feedback in Pull Requests.

Preventing

  • DOMPurify - DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG by Cure53.
  • js-xss - Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist by @leizongmin.
  • Acra - Client-side encryption engine for SQL databases, with strong selective encryption, SQL injections prevention and intrusion detection by @cossacklabs.
  • Csper - A set of tools for building/evaluating/monitoring content-security-policy to prevent/detect cross site scripting by Csper.

Proxy

  • Charles - HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet.
  • mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers by @mitmproxy.

Webshell

Disassembler

Decompiler

DNS Rebinding

  • DNS Rebind Toolkit - DNS Rebind Toolkit is a frontend JavaScript framework for developing DNS Rebinding exploits against vulnerable hosts and services on a local area network (LAN) by @brannondorsey
  • dref - DNS Rebinding Exploitation Framework. Dref does the heavy-lifting for DNS rebinding by @mwrlabs
  • Singularity of Origin - It includes the necessary components to rebind the IP address of the attack server DNS name to the target machine's IP address and to serve attack payloads to exploit vulnerable software on the target machine by @nccgroup
  • Whonow DNS Server - A malicious DNS server for executing DNS Rebinding attacks on the fly by @brannondorsey

Others

Social Engineering Database

Blogs

Twitter Users

  • @HackwithGitHub - Initiative to showcase open source hacking tools for hackers and pentesters
  • @filedescriptor - Active penetrator often tweets and writes useful articles
  • @cure53berlin - Cure53 is a German cybersecurity firm.
  • @XssPayloads - The wonderland of JavaScript unexpected usages, and more.
  • @kinugawamasato - Japanese web penetrator.
  • @h3xstream - Security Researcher, interested in web security, crypto, pentest, static analysis but most of all, samy is my hero.
  • @garethheyes - English web penetrator.
  • @hasegawayosuke - Japanese javascript security researcher.
  • @shhnjk - Web and Browsers Security Researcher.

Practices

Application

AWS

XSS

ModSecurity / OWASP ModSecurity Core Rule Set

Community

Miscellaneous

Code of Conduct

Please note that this project is released with a Contributor Code of Conduct. By participating in this project you agree to abide by its terms.

License

CC0

To the extent possible under law, @qazbnm456 has waived all copyright and related or neighboring rights to this work.

awesome-web-security's People

Contributors

0xflotus avatar 0xinfection avatar bkimminich avatar bzhugs avatar c0nrad avatar chan9390 avatar clintgibler avatar dune73 avatar ehsandeep avatar evyatarmeged avatar firebolt55439 avatar h3xstream avatar hakky54 avatar ievans avatar ihacku avatar jweslley avatar metnew avatar muratyilmazlar avatar nil0x42 avatar okiwan avatar qazbnm456 avatar radekk avatar rips-hb avatar s0md3v avatar servinlp avatar socana avatar streichsbaer avatar uppusaikiran avatar vixentael avatar zonksec avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

awesome-web-security's Issues

language

why the โ€˜Awesome Web Security - ZH .mdโ€™ is English.
a chinese study sad.
a japanese sad too.
QWQ

Resource not found

Hi buddy,

This resource can't be reached. Link is broken or contains some non standard chars.

Rails Security - Written by @qazbnm456.

Please, can you double check the initial link?

Thanks.

Change @UltimateHackers to @s0md3v

Thanks for featuring my XSStrike in your list.

Well I changed my username recently and now its "s0md3v" and not "UltimateHackers" so it would be great if you can change that.

Thanks ^_^

Broken link found!

Hello!
Found following broken links:

  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://bettercrypto.org/static/applied-crypto-hardening.pdf in /github/workspace/README.md
  • https://medium.com/@east5th in /github/workspace/README.md
  • https://twitter.com/realAuxy233 in /github/workspace/README.md
  • https://medium.freecodecamp.org/@alex.birsan in /github/workspace/README.md
  • http://blogs.360.cn/360safe/author/xsecure/ in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/community-projects/the-exploit-database/ in /github/workspace/README.md
  • https://www.zoomeye.org/ in /github/workspace/README.md
  • https://crt.sh/ in /github/workspace/README.md
  • https://haveibeenpwned.com/ in /github/workspace/README.md
  • http://www.mysql-password.com/database/1 in /github/workspace/README.md
  • https://knock.xss.moe/index in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md
  • https://extensions.inrialpes.fr/ in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Link in CONTRIBUTING.md directs to non-functional webpage

In the section "Adding To This List" in CONTRIBUTING.md there is a link that directs to

titlecapitalization.com

This website returns ERR_CONNECTION_REFUSED when loaded.

I suggest finding a similar website and replacing the link.

Broken link found!

Hello!
Found following broken links:

  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/ in /github/workspace/README.md
  • https://www.zoomeye.org/ in /github/workspace/README.md
  • https://crt.sh/ in /github/workspace/README.md
  • https://haveibeenpwned.com/ in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Broken link found!

Hello!
Found following broken links:

  • https://twitter.com/qazbnm456 in /github/workspace/README.md
  • https://www.sneakymonkey.net/2017/04/23/infosec-newbie/ in /github/workspace/README.md
  • https://www.sneakymonkey.net/ in /github/workspace/README.md
  • https://bitvijays.github.io/aboutme.html in /github/workspace/README.md
  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://twitter.com/securitymb in /github/workspace/README.md
  • https://blog.p6.is/Real-World-JS-1/ in /github/workspace/README.md
  • https://twitter.com/po6ix in /github/workspace/README.md
  • https://news.webamooz.com/wp-content/uploads/bot/offsecmag/147.pdf in /github/workspace/README.md
  • https://twitter.com/netsparker in /github/workspace/README.md
  • https://www.netspi.com/ in /github/workspace/README.md
  • https://twitter.com/LightOS in /github/workspace/README.md
  • https://twitter.com/h3xstream/ in /github/workspace/README.md
  • https://twitter.com/_m0bius in /github/workspace/README.md
  • https://0ang3el.blogspot.tw/ in /github/workspace/README.md
  • https://twitter.com/phonexicum in /github/workspace/README.md
  • https://www.vsecurity.com/download/publications/XMLDTDEntityAttacks.pdf in /github/workspace/README.md
  • https://twitter.com/ecbftw in /github/workspace/README.md
  • https://twitter.com/albinowax in /github/workspace/README.md
  • https://s0cket7.com/open-redirect-vulnerability/ in /github/workspace/README.md
  • https://s0cket7.com/ in /github/workspace/README.md
  • https://twitter.com/garethheyes in /github/workspace/README.md
  • https://twitter.com/rhinobenjamin in /github/workspace/README.md
  • https://twitter.com/spengietz in /github/workspace/README.md
  • https://blog.appsecco.com/@yamakira_ in /github/workspace/README.md
  • https://blog.netspi.com/hacking-with-jsp-shells/ in /github/workspace/README.md
  • https://twitter.com/_nullbind in /github/workspace/README.md
  • https://twitter.com/kirbstr in /github/workspace/README.md
  • https://www.blurbiz.io/blog/the-most-complete-guide-to-finding-anyones-email in /github/workspace/README.md
  • https://www.blurbiz.io/ in /github/workspace/README.md
  • https://twitter.com/breenmachine in /github/workspace/README.md
  • https://twitter.com/pwntester in /github/workspace/README.md
  • https://twitter.com/noperator in /github/workspace/README.md
  • https://twitter.com/synacktiv in /github/workspace/README.md
  • https://twitter.com/PhilippeDeRyck in /github/workspace/README.md
  • https://r2c.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/ in /github/workspace/README.md
  • https://twitter.com/ermil0v in /github/workspace/README.md
  • https://twitter.com/SpiderSec/status/1191375472690528256 in /github/workspace/README.md
  • https://twitter.com/SpiderSec in /github/workspace/README.md
  • https://twitter.com/@shhnjk in /github/workspace/README.md
  • https://twitter.com/secjuice in /github/workspace/README.md
  • https://twitter.com/bbuerhaus in /github/workspace/README.md
  • https://twitter.com/malerisch in /github/workspace/README.md
  • https://twitter.com/steventseeley in /github/workspace/README.md
  • https://twosecurity.io/ in /github/workspace/README.md
  • https://twitter.com/GraphX in /github/workspace/README.md
  • https://twitter.com/yu5k3 in /github/workspace/README.md
  • https://paper.seebug.org/910/ in /github/workspace/README.md
  • https://twitter.com/@breenmachine in /github/workspace/README.md
  • http://exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html in /github/workspace/README.md
  • https://twitter.com/blaklis_ in /github/workspace/README.md
  • https://jlajara.gitlab.io/posts/2019/11/30/XSS_20_characters.html in /github/workspace/README.md
  • https://twitter.com/slekies in /github/workspace/README.md
  • https://twitter.com/kkotowicz in /github/workspace/README.md
  • https://twitter.com/sirdarckcat in /github/workspace/README.md
  • https://twitter.com/strukt93/status/931586377665331200 in /github/workspace/README.md
  • https://twitter.com/strukt93 in /github/workspace/README.md
  • https://twitter.com/vinodsparrow in /github/workspace/README.md
  • https://twitter.com/osandamalith in /github/workspace/README.md
  • https://twitter.com/TomNomNom in /github/workspace/README.md
  • https://twitter.com/a66at in /github/workspace/README.md
  • https://twitter.com/codeshtool in /github/workspace/README.md
  • https://twitter.com/d0znpp/ in /github/workspace/README.md
  • https://skavans.ru/en/2017/12/02/xxe-oob-extracting-via-httpftp-using-single-opened-port/ in /github/workspace/README.md
  • https://skavans.ru/ in /github/workspace/README.md
  • https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/ in /github/workspace/README.md
  • https://blog.netspi.com/author/antti-rantasaari/ in /github/workspace/README.md
  • https://twitter.com/_mohemiv in /github/workspace/README.md
  • https://twitter.com/h3xstream in /github/workspace/README.md
  • https://twitter.com/0xacb in /github/workspace/README.md
  • https://www.auxy.xyz/web%20security/2017/07/06/all-ssrf-knowledge.html in /github/workspace/README.md
  • https://twitter.com/Auxy233 in /github/workspace/README.md
  • http://blog.safebuff.com/2016/07/03/SSRF-Tips/ in /github/workspace/README.md
  • http://blog.safebuff.com/ in /github/workspace/README.md
  • https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/august/aspnet-resource-files-resx-and-deserialisation-issues/ in /github/workspace/README.md
  • https://twitter.com/irsdl in /github/workspace/README.md
  • https://twitter.com/AmolBaikar in /github/workspace/README.md
  • https://twitter.com/signalchaos in /github/workspace/README.md
  • https://twitter.com/shhnjk in /github/workspace/README.md
  • https://twitter.com/filedescriptor in /github/workspace/README.md
  • https://twitter.com/@rafaybaloch in /github/workspace/README.md
  • https://twitter.com/magicmac2000 in /github/workspace/README.md
  • https://bo0om.ru/safari-client-side in /github/workspace/README.md
  • https://bo0om.ru/author/admin in /github/workspace/README.md
  • https://twitter.com/kinugawamasato in /github/workspace/README.md
  • https://twitter.com/Abdulahhusam in /github/workspace/README.md
  • http://www.phrack.org/papers/attacking_javascript_engines.html in /github/workspace/README.md
  • http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome-2/ in /github/workspace/README.md
  • https://twitter.com/holynop in /github/workspace/README.md
  • https://twitter.com/halbecaf in /github/workspace/README.md
  • http://twitter.com/moritzj in /github/workspace/README.md
  • https://twitter.com/wanderingglitch in /github/workspace/README.md
  • https://theori.io/research/escaping-chrome-sandbox in /github/workspace/README.md
  • https://twitter.com/tjbecker_ in /github/workspace/README.md
  • https://twitter.com/PatrickBiernat in /github/workspace/README.md
  • https://twitter.com/gaasedelen in /github/workspace/README.md
  • https://twitter.com/itszn13 in /github/workspace/README.md
  • https://sploitus.com/ in /github/workspace/README.md
  • https://twitter.com/i_bo0om in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/ in /github/workspace/README.md
  • https://twitter.com/brutelogic in /github/workspace/README.md
  • https://twitter.com/shodanhq in /github/workspace/README.md
  • https://twitter.com/heipei in /github/workspace/README.md
  • https://twitter.com/zoomeye_team in /github/workspace/README.md
  • https://fofa.so/?locale=en in /github/workspace/README.md
  • https://twitter.com/binarypool in /github/workspace/README.md
  • https://start.me/p/QRENnO/databases in /github/workspace/README.md
  • https://twitter.com/technisette in /github/workspace/README.md
  • https://crt.sh/ in /github/workspace/README.md
  • https://github.com/m4ll0k/WAScan in /github/workspace/README.md
  • https://cure53.de/m in /github/workspace/README.md
  • https://twitter.com/LeeAtBenf in /github/workspace/README.md
  • https://github.com/b17zr in /github/workspace/README.md
  • https://www.n0tr00t.com/ in /github/workspace/README.md
  • https://twitter.com/HackwithGithub in /github/workspace/README.md
  • https://twitter.com/cure53berlin in /github/workspace/README.md
  • https://twitter.com/XssPayloads in /github/workspace/README.md
  • https://twitter.com/hasegawayosuke in /github/workspace/README.md
  • https://twitter.com/owasp_juiceshop in /github/workspace/README.md
  • https://twitter.com/selinuxgame in /github/workspace/README.md
  • https://twitter.com/0xdabbad00 in /github/workspace/README.md
  • https://twitter.com/steike in /github/workspace/README.md
  • https://twitter.com/ChrFolini in /github/workspace/README.md
  • https://www.reddit.com/r/websecurity/ in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md
  • http://iotscanner.bullguard.com/ in /github/workspace/README.md
  • https://twitter.com/jhaddix in /github/workspace/README.md
  • https://twitter.com/fransrosen in /github/workspace/README.md
  • https://voidsec.com/vpn-leak/ in /github/workspace/README.md
  • https://voidsec.com/ in /github/workspace/README.md
  • https://www.sigpwn.io/blog/2018/4/14/domato-fuzzers-generation-engine-internals in /github/workspace/README.md
  • https://twitter.com/itsC0rg1 in /github/workspace/README.md
  • https://twitter.com/jmkeads in /github/workspace/README.md
  • https://twitter.com/matir in /github/workspace/README.md
  • https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/ in /github/workspace/README.md
  • https://www.secjuice.com/author/paul-dannewitz/ in /github/workspace/README.md
  • https://twitter.com/AntoGarand in /github/workspace/README.md
  • https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/ in /github/workspace/README.md
  • https://twitter.com/gergoturcsanyi in /github/workspace/README.md
  • https://twitter.com/@0daywork in /github/workspace/README.md
  • https://segment.com/blog/authors/david-scrobonia/ in /github/workspace/README.md
  • https://twitter.com/slashcrypto in /github/workspace/README.md
  • https://twitter.com/t0nk42 in /github/workspace/README.md
  • https://twitter.com/sandrogauci in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Broken link in CONTRIBUTING.md

The very last line of CONTRIBUTING.md contains a link that is supposed to redirect to Richard Litt's Guide on amending commits. The link is incorrect (broken) and leads to a 404 Error.


The link is currently:

github.com/RichardLitt/docs/blob/master/amending-a-commit-guide.md

The link should be changed to:

github.com/RichardLitt/knowledge/blob/master/github/amending-a-commit-guide.md

Broken link found!

Hello!
Found following broken links:

  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/ in /github/workspace/README.md
  • https://www.zoomeye.org/ in /github/workspace/README.md
  • https://haveibeenpwned.com/ in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Broken link found!

Hello!
Found following broken links:

  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/ in /github/workspace/README.md
  • https://www.zoomeye.org/ in /github/workspace/README.md
  • https://haveibeenpwned.com/ in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Broken link found!

Hello!
Found following broken links:

  • https://www.linkedin.com/in/irenelobovalbuena/ in /github/workspace/README.md
  • https://www.exploit-db.com/ in /github/workspace/README.md
  • https://www.offensive-security.com/ in /github/workspace/README.md
  • https://www.zoomeye.org/ in /github/workspace/README.md
  • https://haveibeenpwned.com/ in /github/workspace/README.md
  • https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/ in /github/workspace/README.md

Hope you will able to fix it soon!
Greetings,
Report-link-action-bot!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.