N7WEra / PublicVulnerableMachines
Publicly availalbe vulnarble by desgin vm/machines
☆31Updated 2 years ago
Alternatives and similar repositories for PublicVulnerableMachines:
Users that are interested in PublicVulnerableMachines are comparing it to the libraries listed below
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆36Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆22Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- ☆24Updated 6 years ago
- ☆48Updated 4 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆27Updated 10 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆14Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- ☆36Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- ☆29Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 6 months ago
- ☆41Updated 2 years ago
- ☆34Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 2 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago