This repository for training application security.
☆26Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for training-application-security
Users that are interested in training-application-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 9 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 11 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆38Sep 14, 2020Updated 5 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆26Aug 16, 2019Updated 6 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Aug 29, 2021Updated 4 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Install XFCE desktop GUI on Arch for Raspberry Pi☆14Apr 30, 2013Updated 12 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago