This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability in our blog.
☆14Oct 1, 2016Updated 9 years ago
Alternatives and similar repositories for Race-conditional-vulnerable-Web-application-
Users that are interested in Race-conditional-vulnerable-Web-application- are comparing it to the libraries listed below
Sorting:
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- ☆20Oct 19, 2018Updated 7 years ago
- A CUI Struts2 Vulnerability Exploit☆16Jul 29, 2016Updated 9 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 6 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Oct 13, 2021Updated 4 years ago
- A proof of concept low-traffic DOS script☆38Apr 6, 2011Updated 14 years ago
- Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.☆26Mar 9, 2025Updated 11 months ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Dusseldorf is an out-of-band security tool to help in security research.☆50Updated this week
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- SSL certificate parsing for humans☆36Jun 30, 2024Updated last year
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Nov 5, 2022Updated 3 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Apr 12, 2024Updated last year
- Small C# caching and cache-filling library, intended as a replacement for memcached in many cases.☆14Apr 28, 2025Updated 10 months ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- Talos is.☆15Sep 23, 2025Updated 5 months ago