This repository for training application security.
☆26Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for training-application-security
Users that are interested in training-application-security are comparing it to the libraries listed below
Sorting:
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 8 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Bash script to test executable properties like (PIE, RELRO, PaX, Canaries, ASLR). (Version derivated from the original one trapkit.de/too…☆24Oct 6, 2013Updated 12 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 5 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- HTTP(S) directory/file brute forcer☆21Feb 22, 2023Updated 3 years ago
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload☆27Jan 6, 2023Updated 3 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Jan 30, 2023Updated 3 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago