ne0z / DamnVulnerableMicroServices
This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)
☆43Updated 2 years ago
Alternatives and similar repositories for DamnVulnerableMicroServices:
Users that are interested in DamnVulnerableMicroServices are comparing it to the libraries listed below
- ☆12Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆51Updated 2 years ago
- ☆18Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Template used for my OSCP exam.☆27Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆89Updated last year
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆22Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆20Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆43Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- ☆24Updated 5 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 3 weeks ago
- Challenge Python☆19Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated last month
- Target practice for ffuf☆61Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- ☆26Updated 4 years ago
- ☆24Updated 2 weeks ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- a map for the azure oriented pentests☆66Updated last year
- Regex patterns for manual application source code review☆27Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago