Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities
☆23Jun 18, 2024Updated last year
Alternatives and similar repositories for vulnerable-code-snippet
Users that are interested in vulnerable-code-snippet are comparing it to the libraries listed below
Sorting:
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆21Sep 4, 2023Updated 2 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- A basic webapp to test XSS payloads.☆26May 1, 2023Updated 2 years ago
- ☆26Jul 12, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆29Dec 13, 2021Updated 4 years ago
- ☆11Sep 15, 2024Updated last year
- Interactive navi redteam cheats☆34Jul 22, 2025Updated 7 months ago
- ☆41Aug 8, 2023Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- ☆37Aug 8, 2021Updated 4 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆13Sep 28, 2024Updated last year
- ☆11Sep 19, 2022Updated 3 years ago
- ☆26Jan 19, 2026Updated last month
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- An advanced XSS vulnerability scanner.☆11Feb 24, 2025Updated last year
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Meet Me .! Misbah Ur Rahman. Selftaught individual who speaks 0's & 1s. Mixture of passsion and profession. Be my guest let's discuss any…☆10Dec 5, 2024Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 2 months ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆10Oct 3, 2021Updated 4 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- ☆18Sep 9, 2025Updated 5 months ago