mchow01 / VulnerableVoterDatabase
A deliberately insecure voter database
☆31Updated 2 months ago
Alternatives and similar repositories for VulnerableVoterDatabase:
Users that are interested in VulnerableVoterDatabase are comparing it to the libraries listed below
- ☆15Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- ☆24Updated 4 years ago
- Hands-on Security Automation in DevOps, published by Packt☆49Updated 2 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆11Updated 5 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- ☆27Updated 4 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆58Updated 2 weeks ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- ☆15Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 5 months ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- AWS Penetration Testing, published by Packt☆31Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆18Updated 2 years ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆11Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆23Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago