FabioBaroni / awesome-web-hackingLinks
A list of web application security
☆27Updated 10 years ago
Alternatives and similar repositories for awesome-web-hacking
Users that are interested in awesome-web-hacking are comparing it to the libraries listed below
Sorting:
- A collection of awesome penetration testing resources, tools and other shiny things☆34Updated 10 years ago
- some pocs for antivirus evasion☆132Updated 2 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- Open source exploit framework made in C#☆54Updated 9 months ago
- PwnableWeb is a suite of web applications for use in information security training.☆88Updated 11 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆92Updated 7 years ago
- ☆122Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- ☆90Updated 8 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Updated 9 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- DefCon24☆121Updated 9 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 6 years ago
- ☆35Updated 10 months ago
- Secure approach to secure file storage in untrusted environments.☆35Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 8 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago