zdresearch / OWASP-ZSC-APILinks
OWASP ZSC API http://api.z3r0d4y.com/v2
☆9Updated 8 years ago
Alternatives and similar repositories for OWASP-ZSC-API
Users that are interested in OWASP-ZSC-API are comparing it to the libraries listed below
Sorting:
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Exploits and research stuffs☆55Updated last year
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Capture the flag - security challenges☆13Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago