Damn Vulnerable Node Application
☆20Dec 22, 2015Updated 10 years ago
Alternatives and similar repositories for DVNA
Users that are interested in DVNA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- A brute-forcing delta robot☆28Sep 17, 2014Updated 11 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- ☆11May 19, 2017Updated 8 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Scripts used to augment the penetration testing process of Drupal web applications.☆95Apr 18, 2017Updated 8 years ago
- Docker container for DVWA☆13Jan 5, 2022Updated 4 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago