Home Search
vulnerable - search results
If you're not happy with the results, please do another search
PwnAdventure3 – Game Intentionally Vulnerable To Hacks
PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...
DVIA – Damn Vulnerable iOS Application
Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...
XVNA – Extreme Vulnerable Node Application
XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
DVHMA – Damn Vulnerable Hybrid Mobile Application
Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
Cybersecurity Toolkit – Essential Python Tools For Penetration Testing
Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing enthusiasts.
In this article, we delve into a range...
CVE-2024-3273 Proof Of Concept (PoC) : Unveiling The Vulnerability In D-Link NAS Devices
This repository contains a Proof of Concept (PoC) for CVE-2024-3273, a security vulnerability discovered in D-Link NAS devices.
The vulnerability allows attackers to execute...
xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches
We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability.
By employing a combination of honeypots, custom ED448 patches,...
Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities
In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for ethical hackers and security...
Awesome DevSecOps – A Comprehensive Guide To Resources And Tooling
DevSecOps is an extension of the DevOps movement that aims to bring security practices into the development lifecycle through developer-centric security tooling and processes.
Contributions welcome. Add links...
CVE-2024-1212 Command Injection Exploit For Kemp LoadMaster : A Comprehensive Guide
This Python script is designed as a proof of concept (PoC) to demonstrate an unauthenticated command injection vulnerability in Kemp LoadMaster, identified as CVE-2024-1212.
Features...