a vulnerable GraphQL application
☆20Dec 13, 2019Updated 6 years ago
Alternatives and similar repositories for hackmegraph
Users that are interested in hackmegraph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NSE Script for GraphQL Introspection Check☆25Jan 9, 2022Updated 4 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- GraphQL security workshop labs☆118Jan 31, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Research on GraphQL from an AppSec point of view.☆417May 24, 2023Updated 2 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆15Jul 8, 2018Updated 7 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ptunnel 0.72 for windows☆24Sep 19, 2014Updated 11 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 2 months ago
- ☆10Feb 28, 2023Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Blog☆10Jul 18, 2023Updated 2 years ago
- Vulnserver exploits☆14May 1, 2020Updated 5 years ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- Guillotine - Security Headers Finder HTTP☆13Apr 25, 2024Updated 2 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- shell for nasm☆65Jun 3, 2020Updated 5 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tool…☆18Nov 22, 2020Updated 5 years ago
- An Xdbg Plugin of the ERC Library.☆26Feb 1, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- ☆28Oct 15, 2025Updated 6 months ago