DarkRelay-Security-Labs / Vulnerable-Windows-ApplicationLinks
Vulnerable Windows Application
☆18Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below
Sorting:
- Information Security Information From Web☆28Updated 6 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- ☆27Updated 2 years ago
- ☆39Updated 4 years ago
- ☆16Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Updated 2 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆20Updated 4 years ago
- ☆16Updated 6 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Notes for CRTP☆42Updated 5 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆27Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- ☆37Updated 2 years ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Updated 4 months ago
- Notes Template/Checklist for PEN-300 OSEP☆16Updated 4 years ago
- offensive notes & resources☆43Updated 10 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Updated 7 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Scripts that automate portions of pentests.☆57Updated last week
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago