Making your own CTF
☆26Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for Vulnerable-Machine
Users that are interested in Vulnerable-Machine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Code for the project: "Audio-Driven Video-Synthesis of Personalised Moderations"☆21Jan 31, 2024Updated 2 years ago
- ☆25Aug 19, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Personal portfolio- The site showcases his projects, skills, and contact information, emphasizing his expertise in front-end development …☆19Mar 21, 2026Updated 3 weeks ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆105Dec 16, 2025Updated 3 months ago
- ☆22Apr 11, 2025Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆72Mar 24, 2024Updated 2 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated 2 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- Simple Python script to interact with the Hacker Target API for IP Tools.☆25Jun 15, 2023Updated 2 years ago
- ☆28May 6, 2025Updated 11 months ago
- ☆15Sep 27, 2024Updated last year
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Learning content, resources, and notes to obtain my AWS Cloud Practitioner Certification.☆15Mar 25, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- 🤖 Small python scripts to crawl data from FIT (Facebook, Instagram, Twitter)☆11Jan 20, 2022Updated 4 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- Python script to get a subtitle file from OpenSubtitles new REST API☆10Nov 25, 2020Updated 5 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 2 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- rcat☆74Mar 7, 2022Updated 4 years ago
- ⚾ Phoney Badger's pokemon colorscripts wrapped with Go into a standalone, cross-platform binary☆26Updated this week
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- TWRP device tree for Mi 11T☆11Dec 28, 2021Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- ☆49Oct 28, 2020Updated 5 years ago