You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 27, 2018. It is now read-only.
<p><b>OWTF</b> wants to help penetration testers use their time most effectively, even if they don’t use <b>OWTF</b> directly. An unfortunate reality of penetration testing is the amount of time that is gone via reporting. Explaining vulnerabilities to non technical customers is difficult. Conveying the urgency of fixing XSS, CSRF and many other issues tends to be non-trivial. Especially when the overall security background from the customer is poor (which is common).<p>
<p>This project aims to:
<ul>
<li>Provide boilerplate vulnerability explanations which can easily be copy-pasted into real-world reports</li>
<li>Provide boilerplate vulnerability fixing recommendations which can easily be copy-pasted into real-world reports</li>
</ul>
</p>
</div>
</div>
<div class="row">
<h2 style="text-align:center;"><b>Search by vulnerability</b></h2>