HappyHackingSpace / vulnerable-targetLinks
Vulnerable Target (VT) is a specialized tool designed for security professionals, researchers, and educators that creates intentionally vulnerable environments across multiple platforms.
☆27Updated 2 weeks ago
Alternatives and similar repositories for vulnerable-target
Users that are interested in vulnerable-target are comparing it to the libraries listed below
Sorting:
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆12Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Updated 5 years ago
- ☆72Updated 4 years ago
- ☆36Updated 10 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Updated 4 years ago
- a deterministic finite automata ranker☆72Updated 3 years ago
- A black-box scanner for HTTP request smuggling vulnerabilities caused by chunk parsing discrepancies.☆24Updated last month
- ☆43Updated 2 months ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Ffuf output browser☆40Updated 2 years ago
- ☆95Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 3 years ago
- ☆27Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated last week
- ☆32Updated last year
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Python resource library for creating security related tooling☆79Updated last year
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Collection of ProjectDiscovery wallpapers☆33Updated 2 years ago