☆505Feb 2, 2025Updated last year
Alternatives and similar repositories for VulnLab
Users that are interested in VulnLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- An open-source, web-based platform that helps users learn programming through interactive, real-time coding challenges.☆22Jul 11, 2025Updated 9 months ago
- A Deliberately Insecure Web Application☆74Jan 9, 2020Updated 6 years ago
- Blind SQL Injection Tool with Golang☆82Dec 31, 2021Updated 4 years ago
- ☆10Aug 11, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆167Jan 7, 2022Updated 4 years ago
- Awesome Vulnerable Applications☆1,392Mar 9, 2026Updated 2 months ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆775Aug 21, 2023Updated 2 years ago
- ☆79Jun 7, 2022Updated 3 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,722Sep 8, 2023Updated 2 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Apr 30, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,733Jul 6, 2025Updated 10 months ago
- Pentest Report Generator☆2,813Apr 23, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Red Team Attack Lab for TTP testing & research☆596May 15, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,290Apr 12, 2024Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,333Jan 10, 2025Updated last year
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,511Mar 14, 2026Updated last month
- ☆1,116Jul 26, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,106Jun 25, 2025Updated 10 months ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- declutters url lists for crawling/pentesting☆1,554Feb 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- vuln-netframework is a .net-framework 4.7 project that include worst coding practices about common vulnerabilities like Insecure Deserial…☆10Nov 9, 2025Updated 6 months ago
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- HTTP Request Smuggling Detection Tool☆537Dec 21, 2023Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆222Apr 1, 2026Updated last month
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,786Mar 23, 2022Updated 4 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,210May 13, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,182Nov 28, 2025Updated 5 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,601Mar 21, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆384Jun 30, 2021Updated 4 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,521Mar 18, 2026Updated last month
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,060Mar 7, 2026Updated 2 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,494May 3, 2026Updated last week
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆194Jul 4, 2024Updated last year