mainframed / DVCA
Damn Vulnerable CICS Application
☆23Updated last year
Alternatives and similar repositories for DVCA:
Users that are interested in DVCA are comparing it to the libraries listed below
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Custom queries list for BloodHound☆23Updated 6 months ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 10 months ago
- ☆54Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆51Updated 4 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆87Updated 8 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- ☆15Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆26Updated 5 months ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- An Evil OIDC Server☆53Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆88Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆27Updated last year
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated 9 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆51Updated 3 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- Enumerate and check domains for Azure tenants☆46Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- ☆9Updated 4 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year