This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the internet. Use only in controlled, isolated environments for security training, demonstrations, and testing.
☆16Apr 25, 2025Updated 10 months ago
Alternatives and similar repositories for InsecureShip
Users that are interested in InsecureShip are comparing it to the libraries listed below
Sorting:
- UNI-2021-2025☆10Aug 7, 2024Updated last year
- Zextras Technical Documentation☆12Updated this week
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆35Updated this week
- A cloud starter kit for beginners — deploy to AWS using Terraform and GitHub Actions, no setup stress.☆17Jun 1, 2025Updated 9 months ago
- ☆12Apr 27, 2023Updated 2 years ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- Secure access cloud terraform provider☆13Updated this week
- forka ai fazeno favor vai q cai mia conta 👍☆10Aug 29, 2022Updated 3 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Hanime.tv stremio addon☆17Feb 10, 2026Updated 2 weeks ago
- VTU, Belagavi syllabus Mobile Application Development 18CSMP68 using android studio☆14Jun 21, 2022Updated 3 years ago
- ☆15Feb 2, 2025Updated last year
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Updated this week
- ☆10Jun 30, 2016Updated 9 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- ☆14Feb 20, 2025Updated last year
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- ☆23May 29, 2025Updated 9 months ago
- Discover how I configured Microsoft Server 2022 on a Virtual Machine for Active Directory, set up a Domain Controller, and created over 1…☆12Apr 8, 2024Updated last year
- macfromip☆10Mar 3, 2023Updated 2 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- ☆12Mar 14, 2022Updated 3 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Open Security Controls Assessment Language Toolbox☆17Feb 4, 2026Updated 3 weeks ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Twitter bot detection using deep learning.☆11Dec 8, 2022Updated 3 years ago
- YouTube music API client library based on Innertube API for Dart & Flutter☆12Sep 26, 2023Updated 2 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- 🍰 Freshly baked builds from HEAD.☆11Nov 6, 2024Updated last year
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated 11 months ago
- ☆12Dec 6, 2022Updated 3 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 9 months ago
- WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.☆13Dec 26, 2014Updated 11 years ago