This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.
☆132Jun 30, 2019Updated 6 years ago
Alternatives and similar repositories for Vulnerable_Machine
Users that are interested in Vulnerable_Machine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Windows privilege escalation with cmd☆91Dec 13, 2021Updated 4 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆18May 3, 2021Updated 4 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Pentesting, Red Teaming. Reports☆12May 25, 2023Updated 2 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Python资源大全中文版,包括:Web框架、网络爬虫、模板引擎、数据库、数据可视化、图片处理等,由伯乐在线持续更新。☆13Oct 30, 2016Updated 9 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆95Mar 12, 2026Updated 3 weeks ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,070Oct 9, 2022Updated 3 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- My personal blog☆15Mar 30, 2026Updated last week
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- 内存分析中玩贪吃蛇☆16Jan 13, 2024Updated 2 years ago
- Notes I made while preparing for the CRTP certification exam☆13Jul 1, 2021Updated 4 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆32Sep 23, 2022Updated 3 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- ☆779Oct 17, 2023Updated 2 years ago
- brownie port of damn vulnerable defi☆14Feb 3, 2022Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Username tools for penetration testing☆1,350Sep 20, 2024Updated last year
- ☆24Mar 6, 2026Updated last month