DarkRelay-Security-Labs / Vulnerable-Windows-ApplicationLinks
Vulnerable Windows Application
☆17Updated last year
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below
Sorting:
- Information Security Information From Web☆28Updated 3 months ago
- ☆27Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Notes for CRTP☆41Updated 4 years ago
- ☆27Updated 3 years ago
- ☆38Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆20Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 11 months ago
- API for Asset Service☆13Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 9 months ago
- ☆16Updated 6 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆37Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆59Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated last week
- ☆16Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year