Acceis / vulnerable-code-snippetsLinks
Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
☆22Updated last year
Alternatives and similar repositories for vulnerable-code-snippets
Users that are interested in vulnerable-code-snippets are comparing it to the libraries listed below
Sorting:
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆54Updated 5 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆69Updated 2 years ago
- ☆30Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆95Updated last year
- ☆42Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆30Updated 2 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Target practice for ffuf☆67Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Information Security Information From Web☆27Updated 10 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Dependency Confusion Security Testing Tool☆48Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- Creates and sends fake meeting invite☆66Updated 4 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- ☆26Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆37Updated 2 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago