This repository for training application security.
☆26Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for training-application-security
Users that are interested in training-application-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 9 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- ☆38Sep 14, 2020Updated 5 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload☆26Jan 6, 2023Updated 3 years ago
- just simple gdb wrapper for switching between several gdb enhancements☆10May 22, 2019Updated 6 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆26Aug 16, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- Vim Plugin for Trivy☆14Feb 20, 2024Updated 2 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Install XFCE desktop GUI on Arch for Raspberry Pi☆14Apr 30, 2013Updated 12 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago