adamdecaf / vulnerabilitiesLinks
Vulnerability teaching showcase
☆13Updated 9 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- ☆42Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- ☆10Updated 9 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- ☆13Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Check for .net padding oracle patch☆19Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Updated 10 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- Communicate with a remote shell easily☆12Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago