Home Search
vulnerable - search results
If you're not happy with the results, please do another search
OpenRelayMagic : Tool To Find SMTP Servers Vulnerable To Open Relay
OpenRelayMagic is a tool to test for vulnerable open relays on SMTP servers.
Features
Check single target/ domain listPort 587 and 465 ImplementedMultithreaded
Also Read - Pytm...
InjuredAndroid : A Vulnerable Android Application
InjuredAndroid is a vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity.
Setup for a physical device
Download...
DVNA : Damn Vulnerable NodeJS Application
Damn Vulnerable NodeJS Application (DVNA) is a simple NodeJS application to demonstrate OWASP Top 10 Vulnerabilities and guide on fixing and avoiding these vulnerabilities....
Silver : Mass Scan IPs For Vulnerable Services
masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these...
EVABS : An Open Source Android Application That Is Intentionally Vulnerable
EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners....
Vulnado – Intentionally Vulnerable Java Application
Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through some of...
Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators
TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to:
Secure Shell (SSH) key filesSecure Socket Layer (SSL)...
DCOMrade : Powershell script for enumerating vulnerable DCOM Applications
DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data...
Libssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933
Libssh-Scanner is a python based script to identify hosts vulnerable to CVE-2018-10933. Libssh scanner has two modes: passive (banner grabbing) and aggressive (bypass auth)...
SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms
Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap automates a normal &...