Damn Vulnerable SCA Application
☆42Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for Damn-vulnerable-sca
Users that are interested in Damn-vulnerable-sca are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- ☆13Mar 1, 2024Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 8 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- ☆89Feb 11, 2022Updated 4 years ago
- Bluetooth Landscape Exploration & Enumeration Platform☆53Dec 31, 2025Updated 2 months ago
- Sourced from gist: https://gist.github.com/mwielgoszewski/7026954☆57May 20, 2022Updated 3 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Nov 12, 2025Updated 3 months ago
- ☆30Jul 28, 2024Updated last year
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Mar 15, 2024Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Every Nuclei template that has ever appeared on Github☆36Jun 2, 2022Updated 3 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Feb 25, 2026Updated last week
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Jan 22, 2026Updated last month
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 3 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆13Dec 3, 2025Updated 3 months ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- Reference security architecture for AI applications☆14Mar 28, 2025Updated 11 months ago