Process Mutex Vulnerability Assessment Tool
-
Updated
Jan 9, 2018 - C++
Process Mutex Vulnerability Assessment Tool
Documentation about the project of a vulnerable web application.
Activities on Penetration Testing
Index-based multi-hazard vulnerability assessment methodology for churches
This repository contains document reports on the results of an automatic security scan. The task was "Vulnerability scan of Metasploitable2 machine using OpenVAS". The report provide detailed summary on each vulnerability, including its severity, potential impact, and recommended mitigation strategies.
Client Overview Artemis Financial, a firm engaged in international financial transactions, required a modernization of its operations with a strong focus on software security. The primary issue addressed was the safeguarding of their web-based applications to protect sensitive financial data, comply with international and domestic regulations, and
Cyber Security Blog and Articles
First assignment for the "Informatics and Organizational Security" subject. The project consisted in developing a vulnerable platform for a e-health corporation, and then creating a secure version of this platform where the vulnerabilities were fixed.
ShadowStrike is an interactive bash script for educational SSH brute force simulation. User-configurable with error handling, it leverages Hydra to automate attacks. Ideal for controlled security testing and learning about vulnerabilities.
A VAPT Report on Microsoft Windows Server 2008 Enterprise Service Pack 1.........
The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It updates packages, installs dependencies, fetches Metasploit, and configures the environment for seamless use, allowing you to run Metasploit tools like `msfconsole` directly from your terminal.
Rapticore API Connector for findings stats - rapticore.com
Grep vulnerability results
This repository contains all the code and data related to my Bachelor Thesis: Vulnerability Assessment for Rowhammer Attack.
measures the vulnerability of the system by formulating the aggregated metric using extended metrics.
A CLI script to instantly fetch subdomains from https://crt.sh ✨🌐
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
In this AKS-focused workshop, you will work with Azure and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
A Web Enumeration Python Script for Vulnerability Assessment and Bug Hunters
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."