DarkRelay-Security-Labs / Vulnerable-Windows-ApplicationLinks
Vulnerable Windows Application
☆17Updated last year
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below
Sorting:
- Information Security Information From Web☆28Updated last month
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Notes for CRTP☆41Updated 4 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆27Updated 2 years ago
- ☆20Updated 3 years ago
- ☆26Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- ☆38Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- offensive notes & resources☆43Updated 4 months ago
- ☆16Updated last year
- ☆16Updated 6 years ago
- ☆24Updated 6 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 9 months ago
- ☆38Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 7 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 2 weeks ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- ☆45Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 7 months ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago