Loading...
Browse 0 cybersecurity solutions, with 0 security professionals searching monthly
Continuous pentest platform simulating real attacks across web, cloud, and network assets.
Vulnerability risk intelligence for prioritizing exploitable vulnerabilities
Online platform for web app security training via hands-on labs and code review
Online platform offering 700+ hands-on web security exercises and training
Real-time threat intel platform detecting malicious scanning & exploitation
A tool to detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.
A tool for identifying and exploiting SSRF vulnerabilities in modern cloud environments by filtering host lists to find viable attack candidates.
A framework for testing and exploiting race condition vulnerabilities through concurrent request analysis and timing attack automation.
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities
Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.
A platform providing an activity feed on exploited vulnerabilities.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
Python exploitation tool for gaining root access to Sixnet RTUs in SCADA networks by exploiting application-level vulnerabilities.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.
A Python library that simplifies format string vulnerability exploitation by providing tools for payload generation, memory manipulation, and automated parameter detection.
A deliberately vulnerable GraphQL application designed for security testing and educational purposes, containing multiple intentional flaws for learning GraphQL attack and defense techniques.
GRFICS is a Unity 3D-based framework that provides a virtual industrial control system environment for practicing ICS security attacks and defenses with visual feedback.
Get strategic cybersecurity insights in your inbox