A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.
☆13Sep 23, 2017Updated 8 years ago
Alternatives and similar repositories for pickle-prick
Users that are interested in pickle-prick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆16May 9, 2016Updated 9 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 2 years ago
- ☆13Jun 13, 2016Updated 9 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Network security exercises in a SDN made from handcrafted packets☆27Nov 11, 2016Updated 9 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Automated Linux From Scratch (ALFS)☆14Jan 10, 2021Updated 5 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆16Apr 13, 2015Updated 11 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 28, 2018Updated 7 years ago
- Mesos on Mesos☆15Mar 11, 2015Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- 🦅 Quick and painless real-time wireless network monitor☆18Mar 16, 2017Updated 9 years ago
- A tool for securing communications between a client and a DNS resolver☆31Jan 22, 2013Updated 13 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆20Nov 6, 2019Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- [DEPRECATED] See https://github.com/src-d/go-mysql-server☆10Feb 9, 2018Updated 8 years ago
- source{d} extension to match Git signatures to real people.☆17Nov 12, 2019Updated 6 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- A Win7 RDP exploit☆13May 14, 2019Updated 6 years ago