a0xnirudh / kurukshetra
Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.
☆141Updated 4 months ago
Alternatives and similar repositories for kurukshetra:
Users that are interested in kurukshetra are comparing it to the libraries listed below
- Bodhi - Client-side Vulnerability Playground☆117Updated 3 years ago
- Damn Vulnerable eXtensive Training Environment☆103Updated 2 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Notes/Tools for pentesting☆82Updated last year
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆154Updated 5 years ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- ☆122Updated 6 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 5 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- Web Application Security☆125Updated 7 months ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- Improved decoder for Burp Suite☆137Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆99Updated last year
- Tools to gather subdomains from Bug Bounty programs☆64Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- ☆70Updated 7 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago