a0xnirudh / kurukshetra
Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.
☆141Updated 5 months ago
Alternatives and similar repositories for kurukshetra:
Users that are interested in kurukshetra are comparing it to the libraries listed below
- Bodhi - Client-side Vulnerability Playground☆118Updated 3 years ago
- Damn Vulnerable eXtensive Training Environment☆103Updated 3 years ago
- Database of websites for penetration testing☆172Updated 5 years ago
- Extreme Vulnerable Node Application☆94Updated 6 years ago
- Files for appsecwiki.com☆117Updated 4 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆189Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 3 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆86Updated 5 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆138Updated 5 years ago
- Web Application Security☆125Updated 8 months ago
- Collection of OSCP study material && tools.☆78Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆64Updated 6 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆68Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A wrapper for Nmap to quickly run network scans☆145Updated 4 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 7 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago