Penetration Testing Practice Profile Certifications Papers Software Mindmaps Gallery FaveApps Links Blog Resources for practicing penetration testing. Please give your feedback / suggestions / comments at My Feedback Page. Alternatively you can also send an email to dev@amanhardikar.com Name Download URL UltimateLAMP http://www.amanhardikar.com/practice/UltimateLAMP-0.2.zip PHDays iBank CTF http://blog.phdays.com/2012/05/once-again-about-remote-banking.html http://downloads.phdays.com/phdays_ibank_vm.zip Backup of Others (work in progress) Applications Infrastructure Misc Copyright © Aman Hardikar. All rights reserved.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.
A free, safe, and legal training ground for ethical hackers to test and expand their skills
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
A reminder that technology alone is not enough to stay secure against social engineering tactics.
Participation in the Red Team for Pacific Rim CCDC 2017 with insights on infrastructure design and competition tips.
Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.