| AlisamTechnology/ATSCAN |
1,270 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
mit |
Perl |
| Advanced dork Search & Mass Exploit Scanner |
| hansmach1ne/LFImap |
150 |
|
0 |
0 |
over 2 years ago |
5 |
July 16, 2024 |
2 |
apache-2.0 |
Python |
| Local File Inclusion discovery and exploitation tool |
| opsxcq/docker-vulnerable-dvwa |
85 |
|
0 |
0 |
about 6 years ago |
0 |
|
5 |
|
PHP |
| Damn Vulnerable Web Application Docker container |
| GDSSecurity/PaddingOracleDemos |
19 |
|
0 |
0 |
over 10 years ago |
0 |
|
0 |
gpl-2.0 |
Python |
| hacktics/nhastie |
15 |
|
0 |
0 |
over 12 years ago |
0 |
|
0 |
other |
|
| NTLM HTTP Authentication Session Tier Exploit |
| Mdot0/Pentesting-Methodology- |
6 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
mit |
|
| When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF. |
| rajganeshp/waed |
5 |
|
0 |
0 |
almost 9 years ago |
0 |
|
0 |
gpl-2.0 |
Shell |
| Web Application and Exploitation Distribution |
| Afriness/Advanced-Penetration-testing |
5 |
|
0 |
0 |
about 5 years ago |
0 |
|
|
gpl-3.0 |
|
| A Step by Step Penetration Testing Sheet for Cyber Security Experts |