avatao-content / challenge-toolbox
The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Updated 10 months ago
Alternatives and similar repositories for challenge-toolbox:
Users that are interested in challenge-toolbox are comparing it to the libraries listed below
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- ☆12Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆68Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- OAuth Security Cheatsheet☆39Updated 10 years ago
- A Pythonic wrapper to MassDNS☆24Updated 6 years ago
- intentionally vulnerable API☆29Updated 4 months ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- ☆38Updated 4 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- ☆28Updated 8 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- ☆25Updated 3 years ago
- This repository for training application security.☆26Updated 5 years ago
- Burp Extension for AWS Signing☆87Updated 2 weeks ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- ☆41Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 7 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Updated 7 years ago