This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulnerable applications running in Docker containers and thousands of cybersecurity resources.
☆496Apr 27, 2026Updated last week
Alternatives and similar repositories for websploit
Users that are interested in websploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆26,179Updated this week
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆20Jul 29, 2021Updated 4 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- ☆22Jun 28, 2016Updated 9 years ago
- 📱 Utility to mount iOS photos and apps on linux, built around ifuse☆21May 5, 2025Updated last year
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆12Jan 5, 2021Updated 5 years ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆17Apr 28, 2018Updated 8 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆17Aug 2, 2021Updated 4 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆24May 15, 2018Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated last month
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated 3 months ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆15Dec 28, 2023Updated 2 years ago
- Files and Links from Go Hack Yourself book and course☆14Feb 11, 2026Updated 2 months ago
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Country information for a given IP address.☆11Mar 22, 2015Updated 11 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Reverse engineering & visual documentation☆26Sep 24, 2024Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆13May 8, 2022Updated 3 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Parse OS X and iPhone Safari Internet History☆22Jul 21, 2014Updated 11 years ago
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago