Vulnerable Node.js Web Application to pratice with your pentesting skills
☆21Apr 29, 2017Updated 8 years ago
Alternatives and similar repositories for VNWA
Users that are interested in VNWA are comparing it to the libraries listed below
Sorting:
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- Popular Apks Downloader☆13Aug 21, 2013Updated 12 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Helped during my OSCP lab days.☆16Dec 7, 2016Updated 9 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆119Aug 4, 2018Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year