Home Search
vulnerable - search results
If you're not happy with the results, please do another search
EDRSandblast : Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And...
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are...
TerraGoat : Vulnerable Terraform Infrastructure
TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their...
Ninjas workout : Vulnerable NodeJS Web Application
Ninjas workout is a Vulnerable NodeJS Web Application.
Quick Start
Download the Repo =>run npm i
After Installing all dependency just run the application
node app.js or nodemon app.js
ADDED...
WannaRace : WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition
WannaRace is a WebApp intentionally made vulnerable to Race Condition
Description
Race Condition vulnerability can be practiced in the developed WebApp. Task is to buy a...
log4j-Scan : A Fully Automated, Accurate & Extensive Scanner For Finding Vulnerable log4j Hosts
log4j-scan is a fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts.
Features
Support for lists of URLs.Fuzzing for more than 60 HTTP request...
Log4J-Detector : Detects Log4J versions on your file-system within any application that are vulnerable...
Log4J-Detector is a Scanner that detects vulnerable Log4J versions to help teams assess their exposure to CVE-2021-44228 (CRITICAL), CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Can search for Log4J instances by carefully...
IAM Vulnerable : Use Terraform To Create Your Own Vulnerable By Design AWS IAM...
IAM Vulnerable is to use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.. IAM Vulnerable uses the Terraform binary and your...
Kubernetes-Goat : Is A “Vulnerable By Design” Kubernetes Cluster
Kubernetes-Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Setting Up Kubernetes Goat
Before we set up the Kubernetes...
Ad-Honeypot-Autodeploy : Deploy A Small, Intentionally Insecure, Vulnerable Windows Domain For RDP Honeypot Fully...
Ad-Honeypot-Autodeploy a tool to Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
Runs on self-hosted virtualization using libvirt with QEMU/KVM (but it can be...
Allsafe : Intentionally Vulnerable Android Application
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like a CTF and more...