Lesser Known Web Attack Lab
☆330Feb 7, 2020Updated 6 years ago
Alternatives and similar repositories for LKWA
Users that are interested in LKWA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Feb 3, 2020Updated 6 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆364Mar 6, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆951Nov 26, 2022Updated 3 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆338Aug 23, 2019Updated 6 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆187Aug 3, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆252Apr 27, 2020Updated 5 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆277Feb 11, 2021Updated 5 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,794Apr 26, 2024Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Feb 12, 2023Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Various Payload wordlists☆240Apr 26, 2025Updated 11 months ago
- ☆31Apr 6, 2021Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 6 years ago
- Quick SQLMap Tamper Suggester☆1,400Jul 18, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of custom security tools for quick needs.☆3,287May 1, 2023Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆771Aug 21, 2023Updated 2 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 5 years ago
- gather gather gather☆584Mar 15, 2025Updated last year