Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/six2dez/wahh_extras
The Web Application Hacker's Handbook - Extra Content
https://github.com/six2dez/wahh_extras
application extras hacker hacking handbook pentest wahh web
Last synced: 22 days ago
JSON representation
The Web Application Hacker's Handbook - Extra Content
- Host: GitHub
- URL: https://github.com/six2dez/wahh_extras
- Owner: six2dez
- Created: 2019-11-09T23:41:19.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2023-06-09T19:11:55.000Z (over 1 year ago)
- Last Synced: 2024-08-05T17:36:14.173Z (4 months ago)
- Topics: application, extras, hacker, hacking, handbook, pentest, wahh, web
- Language: Java
- Size: 102 KB
- Stars: 543
- Watchers: 23
- Forks: 109
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
- awesome-hacking-lists - six2dez/wahh_extras - The Web Application Hacker's Handbook - Extra Content (Java)
README
# wahh_extras
The Web Application Hacker's Handbook - Extra Content
For all of you who have read "The web application hacker's handbook vol2", there are several references to extras, questions, source code that are not easy to found. I've collected all in this repository.
## TOC
- Web applications pentesting
- Book Index
- Answers
- Chapter 2 – Core Defense Mechanisms
- Chapter 3 – Web Application Technologies
- Chapter 4 – Mapping the Application
- Chapter 5 – Bypassing Client-Side Controls
- Chapter 6 – Attacking Authentication
- Chapter 7 – Attacking Session Management
- Chapter 8 – Attacking Access Controls
- Chapter 9 – Attacking Data Stores
- Chapter 10 – Attacking Back-End Components
- Chapter 11 – Attacking Application Logic
- Chapter 12 – Attacking Users: Cross-Site Scripting
- Chapter 13 – Attacking Users: Other Techniques
- Chapter 14 – Automating Customized Attacks
- Chapter 15 – Exploiting Information Disclosure
- Chapter 16 – Attacking Native Compiled Applications
- Chapter 17 – Attacking Application Architecture
- Chapter 18 – Attacking the Application Server
- Chapter 19 – Finding Vulnerabilities in Source Code
- Source Code
- Chapter 14
- Tools
- Proxy / spider tool suites
- Browser extensions \(Firefox\)
- Browser extensions \(Internet Explorer\)
- Java
- ActiveX
- Flash
- Vulnerability scanners
- Miscellaneous
- Web Applicattion attack checklist
- Recon and analysis
- Test handling of access
- Test handling of input
- Test application logic
- Assess application hosting
- Miscellaneous tests## Stargazers over time
[![Stargazers over time](https://starchart.cc/six2dez/wahh_extras.svg)](https://starchart.cc/six2dez/wahh_extras)