Process Mutex Vulnerability Assessment Tool
-
Updated
Jan 9, 2018 - C++
Process Mutex Vulnerability Assessment Tool
Documentation about the project of a vulnerable web application.
Web Security Audit
This repository contains document reports on the results of an automatic security scan. The task was "Vulnerability scan of Metasploitable2 machine using OpenVAS". The report provide detailed summary on each vulnerability, including its severity, potential impact, and recommended mitigation strategies.
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
In this AKS-focused workshop, you will work with Azure and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
A Web Enumeration Python Script for Vulnerability Assessment and Bug Hunters
Index-based multi-hazard vulnerability assessment methodology for churches
Davos exposes data about vulnerabilities in both commercial and open-source software product releases (relatedly useful for operators of Pivotal Application Service)
Welcome to my portfolio, where I showcase my expertise as a security researcher.
Learn more about my skills, experience and goals within cybersecurity,
This is a vulnerable login page that is developed in Python's Flask Framework and a backend MySQL server.
First assignment for the "Informatics and Organizational Security" subject. The project consisted in developing a vulnerable platform for a e-health corporation, and then creating a secure version of this platform where the vulnerabilities were fixed.
ShadowStrike is an interactive bash script for educational SSH brute force simulation. User-configurable with error handling, it leverages Hydra to automate attacks. Ideal for controlled security testing and learning about vulnerabilities.
A VAPT Report on Microsoft Windows Server 2008 Enterprise Service Pack 1.........
Net::OpenVAS - Perl interface for OpenVAS - Open Vulnerability Assessment Scanner
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
CySuite is an all-in-one security testing tool that automates bug hunting checklists on web targets. It hosts additional tools such as request manipulators, wordlist generators and decoders.
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."