Making your own CTF
☆26Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for Vulnerable-Machine
Users that are interested in Vulnerable-Machine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- A Responsive Landing Page For A Restaurant☆17Jun 1, 2024Updated last year
- ☆25Aug 19, 2024Updated last year
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆103Dec 16, 2025Updated 3 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- ☆67Apr 20, 2022Updated 3 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- Info for the Linux Academy AWS Cloud Practitioner Study group!☆14Sep 25, 2019Updated 6 years ago
- Simple Python script to interact with the Hacker Target API for IP Tools.☆25Jun 15, 2023Updated 2 years ago
- ☆27May 6, 2025Updated 10 months ago
- ☆15Sep 27, 2024Updated last year
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 8 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ⚾ Phoney Badger's pokemon colorscripts wrapped with Go into a standalone, cross-platform binary☆23Feb 26, 2026Updated 3 weeks ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Mar 10, 2026Updated last week
- Spaghetti - Web Application Security Scanner☆21Aug 11, 2017Updated 8 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Django initial Authentication (Login, Register, Reset Password) Project☆11Sep 17, 2024Updated last year
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago