avatao-content / challenge-toolboxLinks
The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Updated last year
Alternatives and similar repositories for challenge-toolbox
Users that are interested in challenge-toolbox are comparing it to the libraries listed below
Sorting:
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- ☆12Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- intentionally vulnerable API☆29Updated 9 months ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Scripts to control an "OSCP-like" lab environment.☆24Updated 7 years ago
- Advanced XPath Injection Tool☆34Updated 10 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 9 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- A Custom Scanner for Burp☆30Updated 11 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- ☆41Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- pwk notes and scripts☆15Updated 10 years ago
- BurpJDSer-ng☆29Updated 2 weeks ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- ☆26Updated 8 years ago
- Burp Suite plugin that allow to deserialize Java objects and convert them in an XML format. Unpack also gzip responses. Based on BurpJDSe…☆20Updated last year
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago