Vulnerable Windows Application
☆18Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year
- ☆16Dec 16, 2021Updated 4 years ago
- ☆19Nov 25, 2025Updated 3 months ago
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 2 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- 2022 CTF public release☆23Jun 15, 2022Updated 3 years ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 4 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆10Feb 23, 2026Updated last week
- ☆15Mar 21, 2025Updated 11 months ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- A OWASP Based Checklist With 80+ Test Cases☆156Oct 26, 2022Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Aug 9, 2023Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆10Feb 28, 2023Updated 3 years ago
- ☆57Dec 20, 2018Updated 7 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆11Apr 21, 2022Updated 3 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆29Feb 25, 2026Updated last week
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- ☆10May 29, 2023Updated 2 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago