unixsingh / Thick-Client-Penetration-TestingView external linksLinks
Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.
☆20Apr 6, 2024Updated last year
Alternatives and similar repositories for Thick-Client-Penetration-Testing
Users that are interested in Thick-Client-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆155Oct 26, 2022Updated 3 years ago
- Contains all the scripts and sample apps related to android in app protections.☆40Nov 26, 2025Updated 2 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 4 months ago
- Our repo for crushing through RTO course & labs.☆36Sep 12, 2022Updated 3 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated last year
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Werkzeug password cracker☆18Nov 14, 2024Updated last year
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- ☆25Jun 16, 2025Updated 7 months ago
- AI-VAPT is an autonomous AI-driven Vulnerability Assessment & Penetration Testing framework combining traditional VAPT with neural intell…☆83Oct 7, 2025Updated 4 months ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 5 months ago
- An open-source knowledge base for security researchers.☆17Jan 8, 2025Updated last year
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- Asynchronous Python Wrapper For EgyBest-API.☆14Sep 3, 2024Updated last year
- ☆57Jan 9, 2024Updated 2 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- ☆11Apr 8, 2024Updated last year
- A black-box fuzzing framework for the Intent-Based Networking (IBN)☆15Aug 14, 2023Updated 2 years ago
- Requests based multi-threaded script for increasing views on Vinted☆13Apr 17, 2022Updated 3 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Jan 28, 2026Updated 2 weeks ago
- Pickaxe is a fast and customizable security scan library which simplifies security testing for web applications like Adobe Experience Man…☆15Dec 5, 2023Updated 2 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Jul 29, 2022Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆17Jun 22, 2022Updated 3 years ago
- AES algorithm with pure python implementation.☆17Aug 31, 2023Updated 2 years ago
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidian☆27Mar 8, 2025Updated 11 months ago
- Tailscale powered TCP port forwarding tool☆28Jan 28, 2026Updated 2 weeks ago
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- Received CVE list☆12Dec 24, 2021Updated 4 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- Harness for fuzzing GoldSrc file formats with WinAFL☆20Apr 26, 2020Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year