LDAP Injection Vulnerability Application(Blog Sample Code)
☆22Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for LDAP-Injection-Vuln-App
Users that are interested in LDAP-Injection-Vuln-App are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A NoSQL Injectable Node App☆42Jun 8, 2021Updated 4 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆11Aug 1, 2021Updated 4 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Exploit to dump ipmi hashes☆38Apr 21, 2023Updated 2 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Facebook Bruteforce tool on python 🔐☆15Oct 14, 2024Updated last year
- This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).☆56Mar 12, 2023Updated 3 years ago
- This Streamlit Starter Kit is a collection of educational resources for helping you get started in using Streamlit.☆15May 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆49Dec 2, 2017Updated 8 years ago
- A framework for linking the DOM and DOM based events with scripting languages compiled to WASM. Part of the PyScript project.☆12Oct 1, 2024Updated last year
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A Bash script to monitor and display real-time CPU, memory, and disk usage of your system. The script refreshes every 5 seconds and inclu…☆13Oct 27, 2024Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago
- MVVMUniversal provides a small, portable MVVM foundation (Core.MVVM) and a platform-agnostic library for app concerns and API clients (Co…☆11Sep 15, 2025Updated 6 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Hacking Facebook for fun and profit: It’s not that hard, apparently (exclusive)☆62Jul 2, 2019Updated 6 years ago