一些漏洞场景的还原,基于https://www.exploit-db.com/
☆37Feb 7, 2018Updated 8 years ago
Alternatives and similar repositories for vulnerable-scene
Users that are interested in vulnerable-scene are comparing it to the libraries listed below
Sorting:
- ☆14May 13, 2018Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- 网络流量可配置嗅探,流量包解析,漏洞规则扫描☆84Apr 23, 2022Updated 3 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- ☆64Sep 5, 2017Updated 8 years ago
- Multi-Thread Vulnerability Verify Framework☆55Oct 25, 2018Updated 7 years ago
- 基于Linux c开发的插件式扫描器(Python/lua)☆35Feb 27, 2016Updated 10 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- ☆41Nov 9, 2018Updated 7 years ago
- 跟踪真实漏洞相关靶场环境搭建☆242Jul 19, 2018Updated 7 years ago
- 漏洞靶场平台☆62Jun 17, 2022Updated 3 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- GitLeak 是一个从 Github 上查找密码信息的小工具☆128May 15, 2018Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Use the docker to build a vulnerability environment☆395May 31, 2019Updated 6 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- IF (接口/网页 有变化) THEN ( 提醒你)☆53Oct 13, 2022Updated 3 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Some tools based on docker☆24Jul 28, 2020Updated 5 years ago
- WeReport☆92Nov 9, 2022Updated 3 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- ☆13Mar 23, 2018Updated 7 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- 一款Python 3编写的Struts2安全检测集成工具☆35Jul 13, 2016Updated 9 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- n0js xss challenges☆27Nov 1, 2018Updated 7 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- ☆17Aug 9, 2017Updated 8 years ago