This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the internet. Use only in controlled, isolated environments for security training, demonstrations, and testing.
☆16Apr 25, 2025Updated last year
Alternatives and similar repositories for InsecureShip
Users that are interested in InsecureShip are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 11 months ago
- Open Security Controls Assessment Language Toolbox☆18Apr 22, 2026Updated last week
- Zextras Technical Documentation☆13Updated this week
- Automate vulnerability triage which prioritizes remediation over discovery☆21Apr 25, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Library to ingest and generate VEX documents☆20Mar 9, 2026Updated last month
- Awesome hamburger animation with SVG Animation and Framer-motion created on Video tutorial on CoderOne youtube channel☆16Dec 26, 2020Updated 5 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A Simple Cryptocurrency Portfolio Calculator Built with React.js and Ruby on Rails☆17Mar 16, 2020Updated 6 years ago
- Report on quality of SBOM contents☆25Dec 18, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Example of integrating Next.js 13 app router and mui5☆15Jul 17, 2023Updated 2 years ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated 2 weeks ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This script is a plugin for acme.sh to update CPanel DNS entries☆10Jan 30, 2023Updated 3 years ago
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year
- A terminal tool for exploring postgres query plans.☆14Feb 27, 2026Updated 2 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆57May 1, 2025Updated last year
- Exploit POC for CVE_2026_31431☆392Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- Ansible Guide☆20Jan 9, 2022Updated 4 years ago
- libAppleArchive exploit maker, read the writeup here https://snoolie.gay/blog/CVE-2024-27876☆48Apr 23, 2025Updated last year
- ☆12Apr 27, 2023Updated 3 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated last year
- Generate source code for a set of Python classes from a JSON schema.☆38Oct 25, 2022Updated 3 years ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆105Jan 25, 2026Updated 3 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆86Apr 19, 2026Updated last week
- ☆14Apr 24, 2023Updated 3 years ago
- Library to ingest and generate SBOMs☆41Apr 17, 2026Updated 2 weeks ago
- The Primate Pack is a suite of extensions for Caido.☆14Sep 29, 2024Updated last year
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Developers Excuses☆11May 28, 2016Updated 9 years ago