valtterikodisto / vulnerable-bank
Vulnerable Bank Web Application for Cyber Security Course
☆12Updated 2 years ago
Alternatives and similar repositories for vulnerable-bank:
Users that are interested in vulnerable-bank are comparing it to the libraries listed below
- A collection of scripts from around the web to be used with OSCP☆11Updated 7 years ago
- ☆17Updated 5 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- ☆13Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- ☆24Updated 4 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- ☆9Updated 5 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Updated 4 years ago
- Journey to conquer the OSCP!☆13Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Pentesting-related Bash Scripts☆11Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆18Updated 6 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated last year
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- This is my path to OSCP☆11Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 8 months ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Cyb3rpin7a Tool is keylogger when we run python file on victim pc it's work like trojan and tack screenshot in ever 5 seconds from victim…☆10Updated 4 years ago