Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; ...
Find out how to effectively secure cloud environments using AWS, Azure, ...
Assessment, Analysis, and Hardening of a vulnerable system. This report includes ...
mal-analysis-tools A curated list of malware repositories, trackers and malware analysis ...
Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135) CVE-2022-26135 – ...
CVE-2022-29885 The tool is only used for security research. It is ...
backvenom multi-purpose Red Team Assessment access and exploitation framework for exploitation ...
ZombieThread Another meterpreter injection technique using C# that attempts to bypass ...
A list of search engines useful during Penetration testing, vulnerability assessments, ...