mainframed / DVCALinks
Damn Vulnerable CICS Application
☆29Updated last year
Alternatives and similar repositories for DVCA
Users that are interested in DVCA are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 3 months ago
- ☆60Updated 2 years ago
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆19Updated 6 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 8 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆96Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 8 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 4 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 8 months ago
- Custom queries list for BloodHound☆31Updated 4 months ago
- ☆13Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆36Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Rewriting SIET to python3☆53Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Interactive results explorer and annotation tool for Nosey Parker☆40Updated 4 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Posts about different topics☆40Updated 2 months ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year