shieldfy / AVWA
Advanced Vulnerable Web Application (AVWA)
☆14Updated 7 years ago
Alternatives and similar repositories for AVWA:
Users that are interested in AVWA are comparing it to the libraries listed below
- ☆25Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Docker Version of Aquatone☆14Updated 6 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- A Custom Scanner for Burp☆30Updated 11 years ago
- ☆20Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆11Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- rev shell and manager in go☆20Updated 5 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago