Vulnerable Windows Application
☆18Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆33Feb 25, 2026Updated last month
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- ☆16Dec 16, 2021Updated 4 years ago
- ☆18Nov 25, 2025Updated 4 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Python library for AutoTrader Web broker independent automated trading API☆17Jul 16, 2022Updated 3 years ago
- ☆56Dec 20, 2018Updated 7 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- AI Goat - Learn AI security by attacking and defending a real AI-powered e-commerce application. Built for Red Teamers, security research…☆25Mar 14, 2026Updated last week
- A node utility to scan a domain with various techniques.☆12Sep 10, 2020Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- WS-Attacker is a modular framework for web services Security penetration testing.☆12May 16, 2019Updated 6 years ago
- A OWASP Based Checklist With 80+ Test Cases☆156Oct 26, 2022Updated 3 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆117Apr 15, 2022Updated 3 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- ☆15Nov 27, 2017Updated 8 years ago
- this my repo with notes i take in penetration testing☆29Feb 14, 2026Updated last month
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 3 months ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Jul 22, 2021Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Artifacts for the WOOT publication.☆18Oct 3, 2020Updated 5 years ago