Monorepo of Labs for the Security Knowledge Framework (SKF)
☆44Jun 12, 2025Updated 9 months ago
Alternatives and similar repositories for Labs
Users that are interested in Labs are comparing it to the libraries listed below
Sorting:
- Security Knowledge Framework (SKF) Python Flask / Angular project☆827Mar 12, 2024Updated 2 years ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- Welcome to the secure code review snippets for secure code review snippets! This repository aims to provide developers with valuable exam…☆14Feb 19, 2025Updated last year
- Ejemplos para el curso DI☆13Feb 13, 2019Updated 7 years ago
- ☆13Oct 24, 2024Updated last year
- Code in the presentation☆21Oct 28, 2021Updated 4 years ago
- Repo for all the SKF Docker lab examples☆465Aug 2, 2024Updated last year
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Repository explores Core Concepts in Software Testing☆14Dec 23, 2022Updated 3 years ago
- Want to become an Application Security Engineer? Here's a roadmap to help you get there.☆33Sep 3, 2022Updated 3 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- VULCONHUB provides access to files to build your own hands-on vulnerable container image to learn and practice security☆29Apr 14, 2023Updated 2 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with…☆14May 28, 2024Updated last year
- Parse and Convert a Dockerfile to Bash script.☆11Apr 20, 2018Updated 7 years ago
- Browser based Privacy Aware SBoM Exploration☆28Dec 31, 2025Updated 2 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Mastering AI in Cybersecurity: From Theory to Practice.☆17Dec 17, 2024Updated last year
- OWASP Top 10 Infrastructure Security Risks☆70Oct 20, 2025Updated 5 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Insecure Android Application for testing Biometric bypasses☆15Aug 5, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- AI Security Shared Responsibility Model☆90Sep 26, 2025Updated 5 months ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆17May 18, 2022Updated 3 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- This workshop is designed to help you start or improve your TDD skills.☆18Dec 3, 2018Updated 7 years ago
- CLI to interact with Kondukto☆27Jan 27, 2026Updated last month
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Supporting contact forms for static websites☆22May 29, 2024Updated last year
- ☆33Apr 22, 2025Updated 11 months ago
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆15Oct 24, 2021Updated 4 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago