Lesser Known Web Attack Lab
☆330Feb 7, 2020Updated 6 years ago
Alternatives and similar repositories for LKWA
Users that are interested in LKWA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Feb 3, 2020Updated 6 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆363Mar 6, 2025Updated last year
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆703Jul 27, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Nov 26, 2022Updated 3 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆187Aug 3, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆252Apr 27, 2020Updated 5 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,787Apr 26, 2024Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- ☆32Apr 6, 2021Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 6 years ago
- Quick SQLMap Tamper Suggester☆1,399Jul 18, 2022Updated 3 years ago
- A collection of custom security tools for quick needs.☆3,286May 1, 2023Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆765Aug 21, 2023Updated 2 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 5 years ago
- gather gather gather☆583Mar 15, 2025Updated last year