qazbnm456 / VWGen
Vulnerable Web applications Generator
☆83Updated 6 years ago
Related projects: ⓘ
- Common Findings Database☆100Updated 5 years ago
- ☆92Updated 6 years ago
- unix wildcard attacks☆130Updated 6 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 6 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- Collection of metasploit modules☆65Updated 7 years ago
- ☆62Updated 11 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- ☆61Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 7 years ago
- Hacking challenges☆32Updated 6 years ago
- ☆77Updated 9 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- Shodan HQ nmap plugin - passively scan targets☆150Updated 8 years ago
- ☆42Updated this week
- Neet - Network Enumeration and Exploitation Tool☆167Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- A regex based source code scanner.☆128Updated 7 years ago
- Nmap enumeration and script scan automation script☆38Updated last year
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- Test a network's egress controls with various levels of success and failure.☆101Updated 2 years ago