Tool to scan for domains having .git repos exposed publically
-
Updated
Jan 11, 2019 - Python
Tool to scan for domains having .git repos exposed publically
BugBounty platform for IsetCom Event!
Python模拟SCADA工业控制系统和Modbus协议通信,并对PLC进行漏洞分析和安全检测
Change applications UI labels by hook SetDlgItemTextW(...) in user32.dll.
Hook DnsQueryEX to control domains resolving in any application using dnsapi.dll
Hook GetLocalTime(...) in kernelbase.dll for manipulate system time steps.
SSH server vulnerability and security scanner with Operous
Threat Management is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Threat Management scales its intelligence and expertise through the Threat Managem…
Datasets for evaluating smart contract security analysis tools ( continuously updating... )
Prevents usage of unsafe ObjectInputStream in Minecraft mods
Writeups on my TryHackMe adventures!
WebVulnScan is a Python-based tool designed for conducting vulnerability assessments on web applications using the powerful capabilities of Nmap. It provides two primary scanning options to cater to different needs: stealthy and aggressive scans.
In this course, I build an understanding of the wide range of assets organizations must protect. Explored many of the most common security controls used to protect valuable assets from risk. Also discovered the variety of ways assets are vulnerable to threats by adopting an attacker mindset.
This repository includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
MikroTik RouterOS CVE Vulnerabilities
Python module to query the VARIoT IoT vulnerabilities and exploits databases
This website demonstrates SQL injection vulnerabilities by simulating weak database security and minimal input validation. It shows how attackers can exploit these flaws, underscoring the need for secure coding practices.
Add a description, image, and links to the vunerability topic page so that developers can more easily learn about it.
To associate your repository with the vunerability topic, visit your repo's landing page and select "manage topics."