The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset
☆44Apr 15, 2025Updated last year
Alternatives and similar repositories for OWApp-Benchmarking-Suite
Users that are interested in OWApp-Benchmarking-Suite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Static and Extensible Black-box Application Security Testing tool for iOS and Android applications☆38May 12, 2025Updated 11 months ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Black-box tool that uses Deep Reinforcement Learning to test and explore Android applications☆77Sep 28, 2023Updated 2 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- HideDroid is an Android app that allows the per-app anonymization of collected personal data according to a privacy level chosen by the u…☆212Mar 10, 2024Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 3 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆14Jun 2, 2025Updated 11 months ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 11 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Aug 1, 2025Updated 9 months ago
- ☆16May 3, 2024Updated 2 years ago
- Mickey's Blogs☆42Mar 25, 2026Updated last month
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 3 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated 2 weeks ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 7 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆42Nov 24, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆45Mar 5, 2025Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆99Apr 7, 2024Updated 2 years ago
- A tiny demo app using SSL pinning to block HTTPS MitM interception☆13Aug 8, 2022Updated 3 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Nuclei templates to run on urls☆18Sep 14, 2023Updated 2 years ago