Home Search
vulnerable - search results
If you're not happy with the results, please do another search
Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of...
Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS).
More info on the Doyensec blog
Regexploit: DoS-able Regular Expressions
When thinking...
Wpscvn : Wpscvn Is A Tool For Pentesters, Website Owner To Test If Their...
wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes
The author does not hold any...
AWS Pen-Testing Laboratory : Pentesting Lab With A Kali Linux Instance Accessible Via Ssh...
AWS Pen-Testing Laboratory deployed as IaC with Terraform on AWS. It deploys a Kali Linux instance accessible via ssh & wire guard VPN. Vulnerable...
defenselessV1 : Just Another Vulnerable Web Application
defenselessV1 is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of this application is...
Metarget : Framework Providing Automatic Constructions Of Vulnerable Infrastructures
Metarget = meta- + target, a framework providing automatic constructions of vulnerable infrastructures, used to deploy simple or complicated vulnerable cloud native targets swiftly and automatically.
Why Metarget?
During...
Vulnerablecode : A Free And Open Vulnerabilities Database
VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the data current. It is...
Damn Vulnerable GraphQL Application
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
About DVGA
Damn Vulnerable GraphQL is a...
Fawkes : Tool To Search For Targets Vulnerable To SQL Injection
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Options
-q, --query - Dork that will...
CSRFER : Tool To Generate CSRF Payloads Based On Vulnerable Requests
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a form or a fetch...
Parth : Heuristic Vulnerable Parameter Scanner
Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually contains URLs as the...