Not that much, but still something:
To give you an idea of what can be automated and what should be performed manually, check out this:
For details about specific attacks and attack payloads, check out:
You may try things on:
http://webscantest.com/
http://zero.webappsecurity.com
or with OWASP downloadable vulnerable web applications to not mess up the deployment environment, examples of these are:
- Owasp Juice Shop
- WebGoat
- bwApp
- Burp Suite / ZAP
- Dirbuster / gobuster / wfuzz
- Vega / w3af / arachni / wapiti
- nikto
- nmap
- openssl
- curl
- google dorks