Vulnsy
Web Application28 items

OWASP Top 10 Testing Checklist

A structured testing checklist aligned with the OWASP Top 10 2021 categories. Each phase covers specific vulnerability classes with concrete test cases that security testers can execute to verify application resilience against the most critical web application risks.

OWASP Top 10 2021OWASP WSTGASVS 4.0
Progress: 0 of 28 items
0%
Evidence to capture

request from a low-privileged user successfully invoking an admin endpoint, with the response showing the privileged data or action.

Commands
curl -I -H "Origin: https://evil.com" https://target.com/api/me
Commands
testssl.sh https://target.com
sslyze --regular target.com
Commands
sqlmap -u "https://target.com/page?id=1" --batch --risk=3 --level=5
Commands
curl -sI https://target.com
Commands
npm audit
dependency-check --project target --scan ./
trivy fs .
Evidence to capture

response from the vulnerable parameter showing internal-only data (e.g. AWS metadata service contents at 169.254.169.254/latest/meta-data/).

Industries Using This Checklist

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial