A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
-
Updated
Feb 5, 2024 - Python
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides detailed reports, including STR, highlighting discovered vulnerabilities. It serves as a valuable addition to MobSF.
All things Cybersecurity!
This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentetring purpose. The penetration testing has been done in a sample testable website.
Project Davinci, led by Government Engineering College (GEC) Thrissur, focuses on "Secure-KTU," enhancing the security of the KTU website. The project assesses vulnerabilities per NCIIPC RVDP standards, addressing threats like data breaches and unauthorized access, ensuring safer online services.
Cloud penetration testing methods, phases, lifecycle & tools
Postman-API-Count is a tool that simplifies the extraction and analysis of APIs from Postman collections. It allows users to extract APIs based on specific HTTP methods, identify APIs without any defined methods, and retrieve the total count of APIs in a collection. This tool is beneficial for developers and testers working with Postman collections
Parrot OS : Vulnerability Analysis in Parrot Linux is a mobile app that contains tutorials, commands and live screenshots to help aspiring learners in using Parrot Linux Operating System.
SCOPE [Subdomain Cache Observation, Poisoning & Evaluation] is a simple, yet powerful tool designed to help you find and test vulnerabilities in subdomains that might be exposed to cache poisoning attacks. If a website isn't properly handling cache, it could lead to security issues where malicious content gets stored and served to users.
CyberSecurity Interview Questions
This is a tool used by several security researchers to find Open Redirect Bug
PYTHA-SHELL is an educational cybersecurity tool featuring an RCE mode. It offers practical examples and demonstrations to help students understand various attacks and vulnerabilities in a controlled environment. PYTHA-SHELL provides hands-on experience with real-world security risks making it a valuable resource for learning and teaching
XML-Hydra is a tool to bruteforce user passwords via public facing XML-RPC interface in a Wordpress application.
Your Ultimate Companion for Security Testing and Vulnerability Tracking
Apache Superset - Authentication Bypass
This report presents the findings and recommendations from a security assessment conducted on the Home of Acunetix Art Web Application.
Add a description, image, and links to the vapt topic page so that developers can more easily learn about it.
To associate your repository with the vapt topic, visit your repo's landing page and select "manage topics."