mchow01 / VulnerableVoterDatabaseLinks
A deliberately insecure voter database
☆33Updated last month
Alternatives and similar repositories for VulnerableVoterDatabase
Users that are interested in VulnerableVoterDatabase are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- Hands-on Security Automation in DevOps, published by Packt☆52Updated 2 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆134Updated 2 years ago
- Collection of links to Security stuff☆117Updated 3 months ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆69Updated 6 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆66Updated last month
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- Packet analysis exercises☆44Updated 3 months ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- ☆70Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- ☆14Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Sites and URLs on software and securities that I hope to learn from you guys☆43Updated 4 years ago
- ☆15Updated 3 years ago
- An ongoing list of virtual cybersecurity conferences.☆123Updated 4 years ago
- ☆36Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- ☆83Updated 4 years ago