Examples for Advanced Web Hacking Workshop
☆34Dec 30, 2019Updated 6 years ago
Alternatives and similar repositories for AdvancedWebHackingWorkshop
Users that are interested in AdvancedWebHackingWorkshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 5 months ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Security Audit reports by Decurity☆44Jan 13, 2026Updated 2 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Elasticsearch for Offensive Security☆139Aug 21, 2020Updated 5 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Harvest self-signed certs from Project Sonar Internet-wide scan files and have a look around.☆10Mar 22, 2017Updated 9 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- ☆44Aug 5, 2022Updated 3 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Web Based (novnc) Ubuntu Linux Desktop (Mate) for Kubernetes☆15May 1, 2023Updated 2 years ago
- ☆13Jun 7, 2021Updated 4 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- Some useful scripts for penetration testing☆46May 20, 2017Updated 8 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆179Dec 6, 2023Updated 2 years ago
- Offensive Infrastructure with Modern Technologies☆91Nov 24, 2020Updated 5 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- C++ tools for reading/writing binary data☆27Jun 12, 2022Updated 3 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago