This repository contains writeups for Damn Vulnerable Web Application (DVWA). --------------------------------- Updated writeups and blogs are at: https://github.com/Aftab700/aftab700.github.io
☆26Jan 11, 2026Updated 3 months ago
Alternatives and similar repositories for DVWA-Writeup
Users that are interested in DVWA-Writeup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All of my CTF(THM, HTB, pentesterlab, vulnhub etc.) wirte-ups & notes☆19May 31, 2024Updated last year
- Go console user interface library based on tcell☆75Updated this week
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆16Dec 14, 2024Updated last year
- Cyber Security Notes☆16Dec 11, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- ☆16Jul 20, 2025Updated 8 months ago
- Deep Dive into Hacking and Pentesting, by EC-Council☆17Oct 28, 2022Updated 3 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- This is a CLI tool built with python and SQL which collects data from various sites and presents available arbitrage opportunities.☆11Mar 4, 2023Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- Cybertalents challenges write-ups☆12Apr 4, 2021Updated 5 years ago
- tools, files, and scripts I use for PNPT and CRTO☆24Feb 21, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Development of AI to automate bug bounty☆33Mar 10, 2025Updated last year
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 11 months ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 4 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 3 months ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆49Mar 8, 2026Updated last month
- This repo includes all my codings, analytics and documentation for my AWS DeepRacer Competition☆11Oct 4, 2023Updated 2 years ago
- Suckless setup.☆19May 21, 2021Updated 4 years ago
- ☆20Aug 26, 2025Updated 7 months ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- 🍭 This is my custom Github Readme☆15Mar 9, 2026Updated last month
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)☆11Nov 30, 2023Updated 2 years ago
- Hunt malware with Volatility☆49Mar 3, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆25Aug 30, 2021Updated 4 years ago
- ☆13Oct 16, 2025Updated 6 months ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆46Feb 25, 2026Updated last month
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- ☆36Feb 14, 2023Updated 3 years ago