mikaelkall / vuln
Project to practice the basic at exploit bufferoverflow bugs.
☆10Updated 8 years ago
Alternatives and similar repositories for vuln:
Users that are interested in vuln are comparing it to the libraries listed below
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- ☆20Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 6 years ago
- Python crawler for remote Windows shares☆14Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆38Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago