Damn Vulnerable CICS Application
☆31Mar 2, 2024Updated 2 years ago
Alternatives and similar repositories for DVCA
Users that are interested in DVCA are comparing it to the libraries listed below
Sorting:
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- zigi: The git interface for the rest of us!☆71Oct 7, 2025Updated 4 months ago
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆78Feb 21, 2026Updated last week
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Pentest Report Manager☆26Apr 2, 2025Updated 11 months ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- Purpose-built Red Team network hardware implant made from common components.☆27Mar 18, 2023Updated 2 years ago
- backup (educational) of the mirai bot source and instructions.☆23Oct 3, 2016Updated 9 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- PHP tool to scan ADOdb code for SQL Injections☆31Aug 9, 2016Updated 9 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆42Jul 19, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Mar 2, 2024Updated 2 years ago
- z/OS - all things security☆86May 21, 2020Updated 5 years ago
- ☆109Oct 29, 2024Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- ☆12Oct 22, 2023Updated 2 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- ☆14Sep 15, 2016Updated 9 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- ibm-mongodb-operator☆10Sep 17, 2025Updated 5 months ago