Examples demonstrating some common web application vulnerabilities.
☆46Dec 15, 2015Updated 10 years ago
Alternatives and similar repositories for owasp-top-10-examples
Users that are interested in owasp-top-10-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 8 months ago
- Merges multiple .nessus files into one file.☆46Feb 8, 2023Updated 3 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- This project is a collection of malware signatures for KicomAV.☆11Jan 23, 2026Updated 2 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 6 months ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- A template-based cluster provisioning system☆61Mar 4, 2023Updated 3 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- ☆12Jan 20, 2025Updated last year
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 8 months ago
- Windows process injection methods☆19Jul 18, 2021Updated 4 years ago
- CVE-2016-8610 (SSL Death Alert) PoC☆33Dec 28, 2016Updated 9 years ago
- MOVED: now at https://opendev.org/x/k8s-cloud-provider☆12Sep 26, 2019Updated 6 years ago
- Deeplack is a python script designed for comparing images (screenshots) using DeepAI to detect changes on websites.☆14Jun 19, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- ☆14Feb 2, 2021Updated 5 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated 2 weeks ago
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆47Apr 1, 2026Updated last week
- ☆13Aug 19, 2015Updated 10 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- android安全工具大全☆41Jun 3, 2015Updated 10 years ago
- USA based Information Security & I.T. Conferences☆32Aug 5, 2022Updated 3 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. I…☆15Jan 29, 2014Updated 12 years ago
- Open FAIR Course☆13Feb 4, 2020Updated 6 years ago