JasonHinds13 / hackable
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
☆71Updated 8 months ago
Alternatives and similar repositories for hackable:
Users that are interested in hackable are comparing it to the libraries listed below
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Bash one-liners for great justice!☆12Updated 6 years ago
- Extension of sublister tool to check for subdomain takeovers☆22Updated 7 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Reverse shell generator☆25Updated 5 years ago
- Code that I adapted from the "Violent Python" book☆57Updated 10 years ago
- HTML form parser for humans.☆78Updated 4 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Determine everything you need to know to about a system☆31Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated 2 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago
- Pretty vulnerable flask app..☆23Updated 6 years ago
- Simple vulnearable Flask web application☆26Updated 4 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- PDF report generator for basic recon☆9Updated 7 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Entropy is a (prototype) WAF driven by maths.☆56Updated 5 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆69Updated 8 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Python SQL injection framework☆133Updated 3 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆27Updated 6 years ago