Run Capture the Flags and Security Trainings with OWASP WrongSecrets
☆56Apr 5, 2026Updated last week
Alternatives and similar repositories for wrongsecrets-ctf-party
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- A command line client of kafka☆19Dec 6, 2017Updated 8 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 6 months ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- ☆18Apr 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆27Jan 16, 2026Updated 2 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 10 months ago
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Coherent Line Drawing OpenFaaS function based on https://github.com/esimov/colidr☆10May 2, 2021Updated 4 years ago
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- ☆63Apr 10, 2023Updated 3 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆326Nov 12, 2025Updated 4 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- ☆25Jul 7, 2022Updated 3 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Easy peasy file uploads☆33Aug 29, 2025Updated 7 months ago
- ☆94Oct 13, 2022Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago