Acceis / vulnerable-code-snippets
Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
☆22Updated last year
Alternatives and similar repositories for vulnerable-code-snippets:
Users that are interested in vulnerable-code-snippets are comparing it to the libraries listed below
- A collection of utilities for building extensions using Burp's Montoya API☆47Updated 9 months ago
- ☆30Updated 11 months ago
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆70Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Vulnerable Windows Application☆15Updated last year
- ☆25Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆51Updated 4 years ago
- ☆39Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated 11 months ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- ☆10Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- ☆53Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆26Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- ☆25Updated this week
- ☆27Updated 2 years ago
- ☆21Updated 7 years ago
- ☆56Updated 10 months ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆39Updated 3 years ago