HappyHackingSpace / vulnerable-targetLinks
Vulnerable Target (VT) is a specialized tool designed for security professionals, researchers, and educators that creates intentionally vulnerable environments across multiple platforms.
☆20Updated last month
Alternatives and similar repositories for vulnerable-target
Users that are interested in vulnerable-target are comparing it to the libraries listed below
Sorting:
- Go module for striping CDN IP ranges.☆24Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- ☆42Updated 4 months ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- ☆13Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Basic XSS Scanner☆11Updated 4 years ago
- Recon tool for URLs discovery☆11Updated 11 months ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆11Updated 6 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Updated last year
- Fast, compact and all-around subdomain enumeration tool written in Rust☆23Updated 3 years ago
- Quickly fetches files from Wayback Machine.☆77Updated last year
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- Generates the tree of the directory listing page.☆49Updated last month
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 4 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- Related subdomains finder☆29Updated 3 years ago
- Backend for Nuclear Pond☆21Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- ☆36Updated 4 months ago
- Ffuf output browser☆39Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆26Updated 4 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago