shieldfy / web-malware-collectionLinks
Clone of svn repository of http://insecurety.net/projects/web-malware/ project
☆10Updated 10 years ago
Alternatives and similar repositories for web-malware-collection
Users that are interested in web-malware-collection are comparing it to the libraries listed below
Sorting:
- Vulnerable Java based Web Application☆31Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- A number of scripts POC's and problems solved as pentests move along.☆45Updated last year
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- ☆23Updated 11 years ago
- A collection of Burp Suite extensions☆30Updated 9 years ago
- ☆38Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- ☆23Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆42Updated last year
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆28Updated 2 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Repository for OWASP Code Review document☆16Updated 11 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆83Updated 5 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- ☆45Updated 8 years ago