coffeeandsecurity / DakshSCRALinks
☆44Updated 5 months ago
Alternatives and similar repositories for DakshSCRA
Users that are interested in DakshSCRA are comparing it to the libraries listed below
Sorting:
- Cloud Penetration Testing Toolkit☆106Updated 5 months ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Updated 2 years ago
- AutoSpear☆70Updated last year
- Confluence Hardcoded Password POC☆15Updated 3 years ago
- Playground for Race Condition attack☆25Updated 2 years ago
- Research analysis☆56Updated 3 weeks ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆59Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated 2 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Updated 2 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Updated 3 years ago
- ☆27Updated 3 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- A testing Red Team Infrastructure created with Docker☆32Updated 3 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆106Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Updated 2 years ago
- spring4shell | CVE-2022-22965☆23Updated 3 years ago
- Case for CVE-2022-30778☆23Updated 3 years ago
- Intentionally Vulnerable to Spring4Shell☆52Updated 3 years ago
- ☆21Updated 3 years ago
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆27Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11Updated 2 years ago
- ☆113Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37Updated 2 years ago
- ☆29Updated last year
- CVE-2021-42342 RCE☆42Updated 3 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆163Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Updated 2 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Updated 3 years ago