Vulnerable web application
☆81Feb 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for btslab
Users that are interested in btslab are comparing it to the libraries listed below
Sorting:
- It is a DVWA with some plugins based on real wooyun bug reports☆46Dec 23, 2015Updated 10 years ago
- Web漏洞演练平台☆482Mar 7, 2017Updated 9 years ago
- nmap web gui☆42Jul 11, 2018Updated 7 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- 常用的一些Exploit,经常会更新,也欢迎各位提交新的exp给我。☆26Jul 27, 2018Updated 7 years ago
- python抓取最新的cve漏洞url地址☆10Apr 16, 2018Updated 7 years ago
- Lasercrack-可扩展的Ruby暴力破解框架☆44Jul 4, 2018Updated 7 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- Vulnerable Java based Web Application☆270Jun 20, 2024Updated last year
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 3 weeks ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- python版挖掘鸡☆12Nov 19, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- WackoPicko is a vulnerable web application used to test web application vulnerability scanners.☆346May 25, 2024Updated last year
- ☆22Jan 24, 2019Updated 7 years ago
- ☆11Oct 10, 2019Updated 6 years ago
- ☆12May 17, 2023Updated 2 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆446Aug 7, 2020Updated 5 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- ☆83Oct 19, 2016Updated 9 years ago
- A commandline vulnerability reporter using WP-CLI and WPVulnDB☆31Sep 27, 2025Updated 5 months ago
- 常见漏洞整理和代码审计 Vulneraility☆32Sep 11, 2018Updated 7 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆127May 28, 2019Updated 6 years ago