There are no reviews yet. Be the first to send feedback to the community and the maintainers!
pewapt101
Professionally Evil Web Application Penetration Testing 101harpoon
A collection of scripts, and tips and tricks for hacking k8s clusters and containers.C4
Cyberdelia, a Collection of Command and Control frameworksclient-side-attacks-lab
Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.bloodhound-elementary
Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.x86_asm
x86 Assembly Code Examples for Blog PostsLD_PRELOAD-rand-Hijack-Example
Code samples to go along with the blog post on using LD_PRELOAD to hijack rand() in a number guessing game.DVFPS
A Damn Vulnerable FPS game built using GodotPequod
Lab VM environment for Container Hacking.bash_tricks
a github repo that will be used for teaching bash optimizations in a youtube seriesLD_PRELOAD-run-at-load-time
Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.Python4PEPentesters-exercises
Exercises for the Python for Professionally Evil Pentesters ClassPython4PEPentesters
Python for Professionally Evil PentestersSameSiteAttackDemo
A simple demo web app built with Svelte + Restify that is meant to demonstrate security aspects regarding the SameSite cookie flag.DVMMO
Damn Vulnerable MMO; an mmo game that is deliberately vulnerable and maybe just maybe fun to play.csik
Client Script Injection Kitk8s-labs
LD_PRELOAD-accept-backdoor
Code samples to go along with the blog post on how to create an LD_PRELOAD backdoor hooking accept()CVE-2021-38295-PoC
A simple Python proof of concept for CVE-2021-38295.cookie-monster
Coming soon...PENT
edit_leaked_file_descriptor
An all-in-one tool to edit a leaked file descriptor in SetUID binaries.d0hnut
DNS over HTTPS Security Labstatic-analysis-ttp
container-escape-labs
Some container escape labsLove Open Source and this site? Check out how you can help us