This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the internet. Use only in controlled, isolated environments for security training, demonstrations, and testing.
☆16Apr 25, 2025Updated 11 months ago
Alternatives and similar repositories for InsecureShip
Users that are interested in InsecureShip are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 10 months ago
- Open Security Controls Assessment Language Toolbox☆18Feb 4, 2026Updated 2 months ago
- Zextras Technical Documentation☆12Updated this week
- Automate vulnerability triage which prioritizes remediation over discovery☆20Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Awesome hamburger animation with SVG Animation and Framer-motion created on Video tutorial on CoderOne youtube channel☆16Dec 26, 2020Updated 5 years ago
- Library to ingest and generate VEX documents☆20Mar 9, 2026Updated last month
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A Simple Cryptocurrency Portfolio Calculator Built with React.js and Ruby on Rails☆17Mar 16, 2020Updated 6 years ago
- Report on quality of SBOM contents☆26Dec 18, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Example of integrating Next.js 13 app router and mui5☆15Jul 17, 2023Updated 2 years ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Mar 27, 2026Updated 2 weeks ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- This script is a plugin for acme.sh to update CPanel DNS entries☆10Jan 30, 2023Updated 3 years ago
- OWASP WSTG Türkçe Rehber☆14Apr 9, 2025Updated last year
- Generate VEX (Vulnerability Exploitability Exchange) CycloneDX documents☆23Jan 19, 2025Updated last year
- A terminal tool for exploring postgres query plans.☆13Feb 27, 2026Updated last month
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆55May 1, 2025Updated 11 months ago
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ansible Guide☆20Jan 9, 2022Updated 4 years ago
- libAppleArchive exploit maker, read the writeup here https://snoolie.gay/blog/CVE-2024-27876☆48Apr 23, 2025Updated 11 months ago
- ☆12Apr 27, 2023Updated 2 years ago
- Codeaudit - Modern Python source code security analyzer based on distrust.☆29Updated this week
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 11 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆101Jan 25, 2026Updated 2 months ago
- Generate source code for a set of Python classes from a JSON schema.☆38Oct 25, 2022Updated 3 years ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆61Updated this week
- ☆14Apr 24, 2023Updated 2 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- Library to ingest and generate SBOMs☆39Mar 31, 2026Updated last week
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Developers Excuses☆11May 28, 2016Updated 9 years ago