Vulnerable API for research and education
☆52Feb 25, 2026Updated last week
Alternatives and similar repositories for VulnerableLightApp
Users that are interested in VulnerableLightApp are comparing it to the libraries listed below
Sorting:
- Experimental tagging schema for analysis of intersectionality, bias, and reception theories.☆11Feb 21, 2024Updated 2 years ago
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- a api friendly mongoose pagination tool☆12Nov 9, 2020Updated 5 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- ☆14Oct 19, 2025Updated 4 months ago
- Competitive & Interview Coding questions and solutions.☆10Aug 3, 2021Updated 4 years ago
- ☆10Dec 29, 2023Updated 2 years ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- ☆17Feb 3, 2026Updated last month
- Solutions to Programming Challenges. (Literate Programs.)☆14Jun 22, 2025Updated 8 months ago
- Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/☆11Mar 2, 2026Updated last week
- Discord Hentai Bot based on discordpy rewrite using possible Hentai APIs or APIs containing specific hentai tags☆15Feb 11, 2026Updated 3 weeks ago
- WatchTower - A platform to save your valuable time while staying updated in the Cyber realm.☆18Dec 31, 2025Updated 2 months ago
- android async http simple wrapper with cache policy for rest api☆10Nov 22, 2018Updated 7 years ago
- ☆14Sep 1, 2024Updated last year
- a simplify app extractor☆10Dec 26, 2018Updated 7 years ago
- ☆11May 21, 2019Updated 6 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- Simple python script for brute force attack to smtp users☆12Mar 15, 2024Updated last year
- Populer Web Sites Login Pages☆13Nov 21, 2021Updated 4 years ago
- A Rule34 image viewing platform made to be easy to use, and much prettier than the original site☆13Nov 25, 2025Updated 3 months ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- A simple Node.js server to run nsfw.js for images from IPFS and return its results.☆12Sep 27, 2022Updated 3 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Captain Claw external hack☆21May 18, 2022Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆19Feb 19, 2026Updated 2 weeks ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆52Jul 8, 2024Updated last year
- A fork of Simple Time Tracker with WearOS support. (Now integrated upstream)☆17Mar 7, 2024Updated 2 years ago
- ISPConfig 3☆16Oct 4, 2015Updated 10 years ago
- ☆15Mar 2, 2026Updated last week