setuid0-sec / Swiss_E-Voting_PublicationsLinks
Our publications of the Swiss E-Voting Public Intrusion Test (PIT)
☆47Updated 6 years ago
Alternatives and similar repositories for Swiss_E-Voting_Publications
Users that are interested in Swiss_E-Voting_Publications are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- TLS Redirection☆120Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Reverse shell container for k8s deployments☆49Updated 5 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆89Updated 7 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- ☆52Updated 6 years ago
- Drupal Honeypot☆57Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- ☆38Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- Small CTF challenges running on Docker☆159Updated 7 years ago
- Repository for Insomni'hack finals 2015☆22Updated 10 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 3 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- ☆48Updated last week
- A small, fluid, low-interaction honeypot☆19Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago