DamnVulnerableCryptoApp - An App With Really Insecure Crypto
Why? If you try to learn a little bit more about crypto, either because you want to know how t…
Why? If you try to learn a little bit more about crypto, either because you want to know how t…
A powerful XSS scanner made in python 3.7 Installing Requirements: BeautifulSoup4 pip in…
A proof of concept crypto virus to spread user awareness about attacks and implications of rans…
EternalBlue suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerabili…
An Interactive CTF Exploration Tool This is ctftool , an interactive command line tool to exper…
The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv…
Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create P…
Sub-domain takeover vulnerability occur when a sub-domain ( subdomain.example.com ) is pointin…
Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground t…
The PathAuditor is a tool meant to find file access related vulnerabilities by auditing libc f…
Imperva's customizable API attack tool takes an API specification as an input, and generates…