thatcoderguy / OWASP-Faux-Bank-ClassicASP
A proof of concept project that demonstrates oWASP.org's top 10 web vulnerabilities
☆22Updated 9 years ago
Alternatives and similar repositories for OWASP-Faux-Bank-ClassicASP:
Users that are interested in OWASP-Faux-Bank-ClassicASP are comparing it to the libraries listed below
- Oracle Attacks Tool☆13Updated 8 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Cross-platform entropy calculation script with filtering and custom-block size options.☆7Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆31Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- ☆20Updated 5 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆27Updated 7 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Puny Domain Name Check☆36Updated 5 years ago