34 results for “topic:vunerability”
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
Datasets for evaluating smart contract security analysis tools ( continuously updating... )
Writeups on my TryHackMe adventures!
Python模拟SCADA工业控制系统和Modbus协议通信,并对PLC进行漏洞分析和安全检测
In this course, I build an understanding of the wide range of assets organizations must protect. Explored many of the most common security controls used to protect valuable assets from risk. Also discovered the variety of ways assets are vulnerable to threats by adopting an attacker mindset.
CVE-2025-8088 exploit C++ impl
SSH server vulnerability and security scanner with Operous
Hook GetLocalTime(...) in kernelbase.dll for manipulate system time steps.
Testing FreeBSD VuXML to OSVF conversion repo
Prevents usage of unsafe ObjectInputStream in Minecraft mods
Hook DnsQueryEX to control domains resolving in any application using dnsapi.dll
Tool to scan for domains having .git repos exposed publically
BugBounty platform for IsetCom Event!
🧨 CVE-2025-14783: Easy Digital Downloads Account Takeover PoC
A wifi stress tool (wifi flood tools)
Python module to query the VARIoT IoT vulnerabilities and exploits databases
RedOps is a network and security testing tool. Key features: subdomain discovery, port scanning, and vulnerability testing. New features: Reverse DNS Lookup, DNS Zone Transfer Testing, Open Redirect Testing, Command Injection Testing, and CVE Exploit Checker.
Change applications UI labels by hook SetDlgItemTextW(...) in user32.dll.
This website demonstrates SQL injection vulnerabilities by simulating weak database security and minimal input validation. It shows how attackers can exploit these flaws, underscoring the need for secure coding practices.
An intelligent agent for testing password strength, identifying vulnerabilities, and exploring patterns in password creation.
MikroTik RouterOS CVE Vulnerabilities
Automatic dependency watchdog: detects outdated npm packages, vulnerabilities, and more.
Interactive visualization of the React2Shell (CVE-2025-55182) RCE vulnerability with narrated animations for three audiences: Expert, Practitioner, and Stakeholder. Audio synced via ElevenLabs + Whisper.
🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.
No description provided.
Threat Management is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Threat Management scales its intelligence and expertise through the Threat Management Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.
CISA Known Exploited Vulnerabilities (KEV) Analysis
WebVulnScan is a Python-based tool designed for conducting vulnerability assessments on web applications using the powerful capabilities of Nmap. It provides two primary scanning options to cater to different needs: stealthy and aggressive scans.
A modular platform for internal and public security challenges, designed to train, evaluate, and showcase cybersecurity skills
🚀 Stress test networks effectively with NETWO BUST, a multi-threaded ICMP flood tool for real-time monitoring on Termux and Arch Linux.