Methodology
Ctrlk
  • ๐Ÿ˜ƒWelcome
    • Bullet Proof Strategy
    • ๐Ÿ‘๏ธEnumeration
    • ๐Ÿ‘บExploitation
      • Passwords Attacks
      • Web Applications
        • My little cheatsheet
        • Login Portal Strat
        • SQL injection
        • Local File Inclusion
        • WebDav
        • Wordpress
        • phpmyadmin
        • Bypassing Proxies
        • Node.Js Command Injection
        • Weak Cookies and Parameters
        • PHP Web Shells
        • Code Injection
        • Werkzeug
        • Collection of Vulnerable Apps
          • RaspAP 2.5 Authenticated RCE
          • ZenPhoto 1.4.1.4 RCE
          • Sonatype Nexus 3.21.1
          • Argus Surveillance DVR 4.0
          • SmarterMail + .Net Remote
          • H2 Web Console
          • Exhibitor for Zookeper (Exhibitor Web)
          • Subrion 4.2.1
          • RestStack API 3100
          • Kibana 5.6.15 < 6.6.1
          • Authenticated NodeBB Plugin Emoji 3.2.1
        • Discovering Hidden Parameters
        • ๐Ÿ•ด๏ธJenkins
      • Vulnerable Services
      • Client Side Attacks
      • Evil-WinRM
      • Methodology
      • Reversing
      • Enumerating Firewall
    • ๐Ÿ‘ฝPrivilege Escalation
    • ๐Ÿ’€Elevated Post Exploitation
    • ๐ŸŸฆActive Directory
    • ๐Ÿ˜ŽWalkthroughs
    • Cert Pictures :)
    • ๐ŸPython Lessons
    • ๐ŸšBash Lessons
    • C# Programming
Powered by GitBook
On this page
  1. ๐Ÿ˜ƒWelcome
  2. ๐Ÿ‘บExploitation
  3. Web Applications

Collection of Vulnerable Apps

RaspAP 2.5 Authenticated RCEZenPhoto 1.4.1.4 RCESonatype Nexus 3.21.1Argus Surveillance DVR 4.0SmarterMail + .Net RemoteH2 Web ConsoleExhibitor for Zookeper (Exhibitor Web)Subrion 4.2.1RestStack API 3100Kibana 5.6.15 < 6.6.1Authenticated NodeBB Plugin Emoji 3.2.1
PreviousWerkzeugNextRaspAP 2.5 Authenticated RCE

Last updated 3 years ago