isp1r0 / DVNALinks
Damn Vulnerable Node Application
☆19Updated 9 years ago
Alternatives and similar repositories for DVNA
Users that are interested in DVNA are comparing it to the libraries listed below
Sorting:
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- ☆32Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 9 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- BurpJDSer-ng☆28Updated last week
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- A Custom Scanner for Burp☆30Updated 11 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Updated 8 years ago
- XXE vulnerability demo☆22Updated 11 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago