OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
-
Updated
Sep 11, 2024 - Raku
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
Datasets for evaluating smart contract security analysis tools ( continuously updating... )
Writeups on my TryHackMe adventures!
Python模拟SCADA工业控制系统和Modbus协议通信,并对PLC进行漏洞分析和安全检测
In this course, I build an understanding of the wide range of assets organizations must protect. Explored many of the most common security controls used to protect valuable assets from risk. Also discovered the variety of ways assets are vulnerable to threats by adopting an attacker mindset.
SSH server vulnerability and security scanner with Operous
Prevents usage of unsafe ObjectInputStream in Minecraft mods
Tool to scan for domains having .git repos exposed publically
Python module to query the VARIoT IoT vulnerabilities and exploits databases
Hook GetLocalTime(...) in kernelbase.dll for manipulate system time steps.
Hook DnsQueryEX to control domains resolving in any application using dnsapi.dll
BugBounty platform for IsetCom Event!
Change applications UI labels by hook SetDlgItemTextW(...) in user32.dll.
This website demonstrates SQL injection vulnerabilities by simulating weak database security and minimal input validation. It shows how attackers can exploit these flaws, underscoring the need for secure coding practices.
This repository includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
DevTools is a network and security testing tool. Key features: subdomain discovery, port scanning, and vulnerability testing. New features: Reverse DNS Lookup, DNS Zone Transfer Testing, Open Redirect Testing, Command Injection Testing, and CVE Exploit Checker.
MikroTik RouterOS CVE Vulnerabilities
Threat Management is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Threat Management scales its intelligence and expertise through the Threat Managem…
Add a description, image, and links to the vunerability topic page so that developers can more easily learn about it.
To associate your repository with the vunerability topic, visit your repo's landing page and select "manage topics."