anomen-s / programming-challenges
various programing challenges
☆53Updated 2 weeks ago
Alternatives and similar repositories for programming-challenges:
Users that are interested in programming-challenges are comparing it to the libraries listed below
- Plugin for keepnote to import a XML nmap file☆26Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- ☆52Updated 4 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 8 years ago
- Linux pentest tools☆87Updated 5 years ago
- Git manager for pentesters☆107Updated 8 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Penetration testing scripts☆143Updated 6 years ago
- VPN pentest tools and scripts☆121Updated 7 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆62Updated 2 years ago
- Web Application Security☆125Updated 8 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- ☆179Updated 11 years ago
- ☆26Updated 8 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- ☆193Updated 6 years ago
- ☆51Updated 8 years ago
- ☆20Updated 9 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 7 years ago
- Exploits and Security Tools Framework 2.0.1☆305Updated 2 years ago
- DefCon24☆121Updated 8 years ago