SecGen
Vulnerability VMs
Generates randomised virtual machines with predefined vulnerabilities for educational purposes
Create randomly insecure VMs
3k stars
111 watching
318 forks
Language: Python
last commit: 11 months ago
Linked from 1 awesome list
ctf-challengescyboklabsprovisioningrandomizationsecuritysecurity-vulnerabilityvirtualization
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A comprehensive guide to securing systems and applications by applying engineering principles to security | 9,972 |
| | A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| | Automates malware analysis on Windows VMs for research and testing purposes. | 1,036 |
| | A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| | A plugin for static analysis of Java web applications and Android applications to identify potential security vulnerabilities. | 2,293 |
| | A proof-of-concept project demonstrating a Jackson RCE vulnerability in Ruby that allows an attacker to execute arbitrary commands on the system. | 97 |
| | An API simulator designed to test and demonstrate common web application security vulnerabilities | 1,187 |
| | A tool providing a custom WinRM interface for post-exploitation purposes in Windows environments | 4,605 |
| | Generates a control flow graph for Ethereum Virtual Machine bytecode using symbolic stack analysis | 179 |
| | Reproduces past DeFi hacks to analyze vulnerabilities and improve security in smart contracts | 5,387 |
| | A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data | 209 |
| | A tool for generating Gopher payloads to exploit SSRF vulnerabilities and gain RCE on various servers | 2,909 |
| | A repository of remote code execution exploit samples and proof-of-concepts for Windows. | 741 |
| | A repository containing course materials and resources for teaching binary exploitation and reverse engineering to programmers. | 5,547 |