mainframed / DVCALinks
Damn Vulnerable CICS Application
☆29Updated last year
Alternatives and similar repositories for DVCA
Users that are interested in DVCA are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆78Updated 10 months ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- fully async implementation of Dirkjan's ROADTools☆33Updated 8 months ago
- ☆14Updated last year
- tool for identifying guest relationships between companies☆103Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 4 months ago
- ☆61Updated 2 years ago
- ☆49Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆42Updated 5 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- self-hosted Azure OSINT tool☆31Updated 5 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 9 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Presentaciones de congresos☆55Updated last year
- blame Huy☆42Updated 4 years ago
- ☆42Updated 6 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated this week
- Webshell agent in aspx and php☆27Updated last month
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- results of scraping OneDrive from February 2022 - March 2025☆26Updated 7 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year