• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

vulnerable

  1. itsMe

    Vucsa v1.0.0 - Vulnerable Client-Server Application

    A vulnerable client-server application (VuCSA) is made for learning/presenting how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX graphical user interface). Currently, the vulnerable application contains the following challenges:     Buffer Over-read...
  2. LSDeep

    Silver - Mass scan IPs for vulnerable services

    Silver is a front-end that allows complete utilization of (masscan,nmap) programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more. Features Resumable scanning Slack notifcations Multi-core utilization Supports: IPs, CIDR...
  3. itsMe

    JNDI Exploit Kit: exploit java web apps vulnerable to JNDI Injection

    This is a forked modified version of the great exploitation tool created by @welk1n. This tool can be used to start an HTTP Server, RMI Server, and LDAP Server to exploit java web apps vulnerable to JNDI Injection. Here is what I’ve updated on his tool:     Added support to serialized java...
  4. itsMe

    Ninjasworkout: Vulnerable NodeJS Web Application

    Damn Vulnerable NodeJS Application. ADDED BUGS     Prototype Pollution     No SQL Injection     Cross-site Scripting     Broken Access Control     Broken Session Management     Weak Regex Implementation     Race Condition     CSRF -Cross-Site Request Forgery     Weak Bruteforce Protection    ...
  5. itsMe

    Fawkes v1.0 - Tool To Search For Targets Vulnerable To SQL Injection

    Fawkes - Tool To Search For Targets Vulnerable To SQL Injection (Performs The Search Using Google Search Engine) Hidden content
  6. itsMe

    CSRFER - Tool to generate csrf payloads based on vulnerable requests

    Hidden content  
  7. dEEpEst

    Hacking Vulnerable Websites 

     Hacking Vulnerable Websites  1. SQL Injection - Bypass Login Algorithms, Sabotage The Data, Etc. 2. Denial of Service Attacks -  Deny Legitimate Users Access To The Resource 3.  Cross Site Scripting XSS- Deny Legitimate Users Access To The Resource These Are Three Top Notch Way To Hack a...
  8. dEEpEst

    Hacking Vulnerable Websites [Detailed]

    Hidden content
  9. dEEpEst

    SSRF Vulnerable Lab

    Server-Side Request Forgery (SSRF) vulnerable Lab This repository contain PHP codes which are vulnerable to Server-Side Request Forgery (SSRF) attack. I would like to say Thank You to @albinowax, AKReddy, Vivek Sir (For being great personalities who always supported me), Andrew Sir -...
  10. E

    [INTERNET RADIO] Get parser vulnerable to screen data tampering

    > https://www.internet-radio.com/player/?mount=http://66.70.187.44:9172/listen.pls?sid=1&title=Privateloader%20Radio%20-%20Music%20From%20Within%20The%20Harder%20Styles&website=http://www.privateloader.com Mount: Point to any *.pls radio Sid: Dummy control, active/desactive the...
Back
Top