appsecco / vulnerable-appsLinks
☆218Updated 3 years ago
Alternatives and similar repositories for vulnerable-apps
Users that are interested in vulnerable-apps are comparing it to the libraries listed below
Sorting:
- ☆208Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 8 months ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Updated 3 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Updated last year
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- Burp extension to perform Java Deserialization Attacks☆216Updated last year
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Updated 7 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- Damn Vulnerable eXtensive Training Environment☆108Updated 3 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆240Updated 6 years ago
- A collection of useful Serverless functions I use when pentesting☆391Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generator☆110Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆297Updated 2 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆293Updated last year
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 8 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆167Updated 6 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Updated 8 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- An exploit for Apache Struts CVE-2018-11776☆303Updated 7 years ago
- Sample vulnerable code and its exploit code☆190Updated 4 years ago
- Contents for Node.Js Security Course☆343Updated 5 years ago
- Pentest/BugBounty progress control with scanning modules☆282Updated 5 years ago
- XSS Hunter Burp Plugin☆152Updated 7 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆264Updated 2 years ago
- ☆162Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Updated 4 years ago