awesome-web-security/README.md

89 lines
3.1 KiB
Markdown
Raw Normal View History

# Awesome Web Security [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
[<img src="https://upload.wikimedia.org/wikipedia/commons/6/61/HTML5_logo_and_wordmark.svg" align="right" width="70">](https://www.w3.org/TR/html5/)
> 🐶 A curated list of Web Security materials and resources.
*Please read the [contribution guidelines](CONTRIBUTING.md) before contributing.*
---
<p align="center"><b>🌈 Want to strengthen your penetration skills?</b><br>I would recommend to play some <a href="https://github.com/apsdehal/awesome-ctf" target="_blank">awesome-ctf</a>s.</p>
---
Check out my [repos](https://github.com/qazbnm456) 🐾 or say *hi* on my [Twitter](https://twitter.com/qazbnm456).
## Menu
2017-01-31 04:20:24 -05:00
- [Resource](#resource)
- [SQL Injection](#resource-sql-injection)
- [XML](#resource-xml)
- [Evasion](#evasion)
- [CSP](#evasion-csp)
- [Trick](#trick)
- [SQL Injection](#trick-sql-injection)
- [Tool](#tool)
2017-01-31 04:20:24 -05:00
- [Code Generating](#tool-code-generating)
- [Fuzzing](#tool-fuzzing)
- [Detecting](#tool-detecting)
- [Blog](#blog)
- [Miscellaneous](#miscellaneous)
2017-01-31 04:20:24 -05:00
## Resource
2017-01-31 04:20:24 -05:00
<a name="resource-sql-injection"></a>
### SQL Injection
2017-01-31 04:20:24 -05:00
* [HQL for pentesters](http://blog.h3xstream.com/2014/02/hql-for-pentesters.html)
<a name="resource-xml"></a>
### XML
* [XML实体攻击 - 从内网探测到命令执行步步惊心](http://www.freebuf.com/video/49961.html), written by 张天琪.
## Evasion
<a name="evasion-csp"></a>
### CSP
2017-01-31 04:20:24 -05:00
* [CSP: bypassing form-action with reflected XSS](https://labs.detectify.com/2016/04/04/csp-bypassing-form-action-with-reflected-xss/), written by [Detectify Labs](https://labs.detectify.com/).
## Trick
<a name="trick-sql-injection"></a>
### SQL Injection
* [屌智硬之mysql不用逗号注入](http://www.jinglingshu.org/?p=2220), written by [jinglingshu](http://www.jinglingshu.org/?p=2220).
* [见招拆招绕过WAF继续SQL注入常用方法](http://www.freebuf.com/articles/web/36683.html), written by [mikey](http://www.freebuf.com/author/mikey).
## Tool
2017-01-31 04:20:24 -05:00
<a name="tool-code-generating"></a>
### Code Generating
* [VWGen](https://github.com/qazbnm456/VWGen) - Vulnerable Web applications Generator by [@qazbnm456](https://github.com/qazbnm456).
2017-01-31 04:20:24 -05:00
<a name="tool-fuzzing"></a>
### Fuzzing
* [wfuzz](https://github.com/xmendez/wfuzz) - Web application bruteforcer by [@xmendez](https://github.com/xmendez).
2017-01-31 04:20:24 -05:00
<a name="tool-detecting"></a>
### Detecting
* [sqlchop](https://github.com/chaitin/sqlchop/) - [DEPRECATED] A novel SQL injection detection engine built on top of SQL tokenizing and syntax analysis by [chaitin](http://chaitin.com).
## Blog
* [Broken Browser](https://www.brokenbrowser.com/) - Fun with Browser Vulnerabilities.
## Miscellaneous
* [如何正確的取得使用者 IP ](http://devco.re/blog/2014/06/19/client-ip-detection/)
## License
[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](https://creativecommons.org/publicdomain/zero/1.0/)
To the extent possible under law, [Sindre Sorhus](http://sindresorhus.com) has waived all copyright and related or neighboring rights to this work.